2020-12-05 13:23:33.419 41 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf 2020-12-05 13:23:33.420 38 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf 2020-12-05 13:23:33.421 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-05 13:23:33.421 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-05 13:23:33.422 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-05 13:23:33.422 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-05 13:23:33.422 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-05 13:23:33.422 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-05 13:23:33.422 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-05 13:23:33.422 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.423 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-05 13:23:33.423 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-05 13:23:33.423 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-05 13:23:33.423 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.423 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-05 13:23:33.423 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.424 41 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.424 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-05 13:23:33.424 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-05 13:23:33.424 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-05 13:23:33.424 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.424 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-05 13:23:33.424 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-05 13:23:33.425 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-05 13:23:33.425 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-05 13:23:33.425 38 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.425 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-05 13:23:33.425 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.425 41 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.425 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-05 13:23:33.425 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-05 13:23:33.425 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-05 13:23:33.425 41 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-05 13:23:33.426 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-05 13:23:33.426 41 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-05 13:23:33.426 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-05 13:23:33.426 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-05 13:23:33.426 41 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-05 13:23:33.426 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-05 13:23:33.426 41 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-05 13:23:33.426 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.426 41 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-05 13:23:33.426 38 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.426 41 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.427 41 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.427 38 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-05 13:23:33.427 41 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.427 38 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-05 13:23:33.427 41 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.427 38 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-05 13:23:33.427 41 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.427 38 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-05 13:23:33.427 38 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-05 13:23:33.427 41 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 38 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 41 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 38 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 41 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 38 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 41 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 38 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 41 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 41 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.428 38 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 41 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 38 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 41 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 38 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 41 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 38 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 41 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 38 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 41 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 38 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.429 41 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 41 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 38 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 41 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 38 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 41 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 38 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 41 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 38 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 41 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.430 38 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 41 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 38 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 38 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 41 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 41 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 38 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 41 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 38 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.431 38 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 38 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 41 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 38 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 41 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 38 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 41 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 38 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 41 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.432 38 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 41 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 38 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 41 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 38 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 41 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 38 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 41 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.433 38 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.433 41 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.433 38 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.434 41 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.434 38 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.434 41 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.434 38 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.434 41 DEBUG tempest [-] auth.admin_project_name = patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.434 38 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.434 41 DEBUG tempest [-] auth.admin_username = patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.434 38 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.434 41 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.434 38 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 41 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 38 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 41 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 38 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 41 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 38 DEBUG tempest [-] auth.admin_project_name = patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 41 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 38 DEBUG tempest [-] auth.admin_username = patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 41 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.435 38 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 41 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 38 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 41 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 38 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 41 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 38 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 41 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 38 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 41 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 38 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.436 41 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 38 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 41 DEBUG tempest [-] compute.fixed_network_name = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 38 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 41 DEBUG tempest [-] compute.flavor_ref = 7f08d304-dde5-4abb-ab77-f7ebcff62b95 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 38 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 41 DEBUG tempest [-] compute.flavor_ref_alt = e799f7f2-ff32-4186-bcdc-11f1dd3a8fd5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 38 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 41 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.437 38 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 41 DEBUG tempest [-] compute.image_ref = ea31bd24-c485-4379-b2df-6f414a2f50d9 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 38 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 41 DEBUG tempest [-] compute.image_ref_alt = e54414df-227d-4fb4-a571-34577fa0a85c log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 38 DEBUG tempest [-] compute.fixed_network_name = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 41 DEBUG tempest [-] compute.max_microversion = 2.87 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 38 DEBUG tempest [-] compute.flavor_ref = 7f08d304-dde5-4abb-ab77-f7ebcff62b95 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 41 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 38 DEBUG tempest [-] compute.flavor_ref_alt = e799f7f2-ff32-4186-bcdc-11f1dd3a8fd5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 41 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.438 38 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 38 DEBUG tempest [-] compute.image_ref = ea31bd24-c485-4379-b2df-6f414a2f50d9 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 41 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 38 DEBUG tempest [-] compute.image_ref_alt = e54414df-227d-4fb4-a571-34577fa0a85c log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 41 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 38 DEBUG tempest [-] compute.max_microversion = 2.87 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 41 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 38 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 41 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.439 38 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 41 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 38 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 41 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 38 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 38 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 41 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.440 38 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 41 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 38 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.440 41 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 38 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 41 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 41 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 38 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.441 41 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 38 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 41 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 38 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.441 41 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 38 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 41 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 38 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 41 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 38 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 41 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 38 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 41 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.442 38 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 41 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 38 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 41 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 38 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 41 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 38 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 41 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 38 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 41 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.443 38 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 41 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.444 38 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 41 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 38 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 41 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 38 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 41 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 38 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.444 41 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-05 13:23:33.444 38 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.445 38 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.445 41 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.445 41 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.445 38 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.445 41 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.445 38 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.445 41 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.446 38 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-05 13:23:33.446 41 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.446 38 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.446 41 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.446 38 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.446 41 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.446 38 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.446 41 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 38 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 41 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 38 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.447 41 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 38 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 41 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 38 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 41 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 38 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.447 41 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 38 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 41 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 38 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 41 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 41 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 38 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 41 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 38 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 41 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.448 38 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 41 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 38 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 41 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 38 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 41 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 38 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 41 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.449 38 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 41 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 38 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 41 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 38 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 41 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 38 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 41 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 38 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 41 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.450 38 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 41 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 38 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 41 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 38 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 41 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 38 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 41 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 38 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 41 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.451 38 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 38 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 41 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.452 38 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 41 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 38 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 41 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 38 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 41 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.452 38 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 41 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 41 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 38 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.453 41 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 38 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 41 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 38 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 41 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.453 38 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 41 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 38 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 41 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 38 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 41 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 38 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 41 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 38 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.454 41 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 38 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 41 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 38 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 41 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 38 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 38 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 41 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 38 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 41 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.455 38 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 41 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 38 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 41 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 38 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 41 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.456 38 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 41 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 38 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.456 41 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.457 38 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.457 41 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.457 38 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.457 41 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.457 38 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.457 41 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.457 38 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.457 41 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 41 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 38 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.458 41 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 38 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 41 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 38 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 41 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 38 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.458 41 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 38 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 41 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 38 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 41 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 38 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 41 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 38 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 41 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 38 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 41 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.459 38 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 41 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 38 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 41 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 38 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 41 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 38 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 41 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 38 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 41 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.460 38 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 41 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 38 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 41 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 38 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 38 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 41 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 38 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 41 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.461 38 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 41 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 38 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 41 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 38 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 41 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 41 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 38 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 41 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.462 38 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 41 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 38 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 41 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 38 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 41 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 38 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 41 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 38 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 41 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.463 38 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 41 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 38 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 41 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 38 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 41 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 38 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 41 DEBUG tempest [-] validation.network_for_ssh = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 38 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 41 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 38 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.464 41 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 38 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 41 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 38 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 41 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 38 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 41 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 38 DEBUG tempest [-] validation.network_for_ssh = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 41 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.465 38 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 41 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 38 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 41 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 38 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 38 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 41 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 38 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 41 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 38 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.466 41 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 38 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 41 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 38 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 41 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 38 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 41 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 38 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 41 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 38 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.467 41 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 38 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 41 DEBUG tempest [-] volume.max_microversion = 3.62 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 38 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 41 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 38 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 41 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 38 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 41 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 38 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.468 41 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 38 DEBUG tempest [-] volume.max_microversion = 3.62 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 41 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 38 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 41 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 38 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 41 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 38 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 41 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 38 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.469 41 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 38 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 41 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 38 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 41 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 38 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 41 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 38 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 39 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf 2020-12-05 13:23:33.470 41 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 38 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.470 41 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 38 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 41 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 38 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 41 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 38 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 41 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 38 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 41 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 38 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 41 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.471 38 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 41 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 38 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 41 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-05 13:23:33.472 38 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 41 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-05 13:23:33.472 41 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 38 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 41 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 38 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 41 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 38 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.472 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-05 13:23:33.473 41 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 38 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-05 13:23:33.473 41 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 38 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 41 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 38 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-05 13:23:33.473 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.473 38 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 41 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.473 38 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 41 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-05 13:23:33.474 38 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 41 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 38 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 41 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.474 38 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 41 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-05 13:23:33.474 38 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 41 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 38 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.474 39 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.475 41 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 38 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 41 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 38 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-05 13:23:33.475 41 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-05 13:23:33.475 38 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-05 13:23:33.475 41 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-05 13:23:33.475 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-05 13:23:33.475 38 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 41 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.475 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-05 13:23:33.476 41 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 38 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-05 13:23:33.476 41 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 38 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-05 13:23:33.476 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.476 41 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 38 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 39 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.476 41 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 38 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 41 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 38 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.476 39 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-05 13:23:33.476 41 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 38 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 39 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-05 13:23:33.477 41 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 38 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 39 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-05 13:23:33.477 41 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 38 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 39 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-05 13:23:33.477 41 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 38 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 39 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-05 13:23:33.477 41 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 38 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.477 39 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.477 41 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 38 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 39 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.478 41 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 38 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 39 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.478 41 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 39 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.478 38 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 41 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 38 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 39 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.478 41 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 38 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 39 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.478 41 DEBUG tempest [-] placement.max_microversion = 1.36 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.478 38 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 41 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 39 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.479 38 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 41 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 39 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.479 38 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 41 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 39 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.479 38 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 41 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 39 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.479 38 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 41 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 39 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.479 38 DEBUG tempest [-] placement.max_microversion = 1.36 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.479 41 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 39 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.480 38 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 41 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 39 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.480 38 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 41 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 39 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.480 38 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 41 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 39 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.480 38 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 41 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 39 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.480 38 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.480 39 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.480 41 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 38 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 39 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.481 41 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 38 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 39 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.481 41 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 38 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 39 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.481 41 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 38 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.481 39 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.481 41 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 38 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 39 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.482 41 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 38 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 39 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.482 41 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 38 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 39 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.482 41 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 38 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 39 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.482 41 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 38 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.482 39 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.482 41 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 38 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 41 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 39 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.483 38 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 39 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.483 41 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 38 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 39 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.483 41 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 38 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 39 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.483 41 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 38 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.483 39 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.483 41 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 38 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 39 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.484 41 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 38 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 39 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.484 41 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 38 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 39 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 41 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 38 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 41 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 39 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 41 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 38 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.484 39 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 41 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 38 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 39 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 41 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 38 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 39 DEBUG tempest [-] auth.admin_project_name = patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 41 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 38 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 39 DEBUG tempest [-] auth.admin_username = patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 41 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 38 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 39 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 41 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 38 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 39 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.485 41 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 38 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 39 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 41 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 38 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 39 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 41 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 38 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 39 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 41 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 38 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 39 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 41 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 38 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 39 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.486 41 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 38 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 39 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 41 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 38 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 39 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 41 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 38 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 39 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 41 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 38 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 39 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 41 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 38 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 39 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 41 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.487 38 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 41 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 39 DEBUG tempest [-] compute.fixed_network_name = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 38 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 41 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 39 DEBUG tempest [-] compute.flavor_ref = 7f08d304-dde5-4abb-ab77-f7ebcff62b95 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 38 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 41 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 39 DEBUG tempest [-] compute.flavor_ref_alt = e799f7f2-ff32-4186-bcdc-11f1dd3a8fd5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 38 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 41 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 39 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 38 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 41 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 39 DEBUG tempest [-] compute.image_ref = ea31bd24-c485-4379-b2df-6f414a2f50d9 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.488 38 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 41 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 39 DEBUG tempest [-] compute.image_ref_alt = e54414df-227d-4fb4-a571-34577fa0a85c log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 38 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 41 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 38 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 39 DEBUG tempest [-] compute.max_microversion = 2.87 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 41 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 38 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 39 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 41 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 38 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 39 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 41 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.489 38 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 39 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 41 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 38 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 39 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 41 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 38 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 39 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 41 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 38 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 39 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 41 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 38 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 41 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 39 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.490 38 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 41 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 39 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 38 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 41 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 38 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 39 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.491 41 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 38 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 39 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 41 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 38 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 41 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 39 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.491 38 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 41 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 39 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 38 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 41 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 39 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 38 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 41 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 39 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 38 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 41 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 39 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 38 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 41 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 39 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 38 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.492 41 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 39 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 38 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 41 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 39 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 38 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 41 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 39 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 38 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 41 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 39 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 38 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 41 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 39 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.493 38 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 41 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 39 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 38 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 41 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 39 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 38 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 41 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 39 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 38 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 41 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 39 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 38 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 41 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.494 38 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 41 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 39 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.495 38 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 41 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 39 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 38 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 41 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 39 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 38 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 41 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 39 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 38 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 41 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 39 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-05 13:23:33.495 38 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.495 41 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 38 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 41 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 39 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 38 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 41 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 39 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 38 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 41 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 39 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 38 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 41 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 39 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 38 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 41 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.496 39 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.496 41 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 38 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 41 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 39 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 38 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 41 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 38 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 39 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 41 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 38 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 39 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 41 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 38 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.497 39 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 41 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 38 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 39 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 41 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 38 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 39 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 41 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 38 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 39 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 41 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 38 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 39 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 41 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 38 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 39 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 41 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.498 38 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 39 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 41 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 38 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 39 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 41 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 38 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 39 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 41 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 38 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 39 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 41 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 38 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 41 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.499 39 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 38 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 41 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 39 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 38 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 41 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 39 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 38 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 41 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 39 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 38 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 41 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 39 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 38 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.500 41 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 39 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 38 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 41 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 39 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 38 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 41 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 39 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 38 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 41 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 38 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 39 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 38 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 41 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.501 39 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 38 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 41 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 39 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 38 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 41 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 39 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 38 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 41 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 39 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 41 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 38 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 39 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 41 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 38 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.502 39 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.503 41 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 38 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 39 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 41 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 38 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 39 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 41 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 38 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 39 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 41 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 38 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 39 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 41 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 38 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 39 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 41 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.503 38 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 41 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 39 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 38 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 41 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 39 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 38 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 41 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 39 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 38 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 41 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 39 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 38 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.504 41 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 39 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 38 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 41 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 39 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 38 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 41 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 39 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 38 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 41 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 39 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 38 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 41 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 39 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 38 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.505 41 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 38 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 39 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 41 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 38 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 41 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 39 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 38 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 41 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 39 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 38 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 41 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 39 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 38 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 41 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.506 39 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 38 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 41 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 38 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 41 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 39 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.507 38 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 41 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 39 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 38 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 41 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 39 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.507 38 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 41 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 38 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.507 39 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 41 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 38 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 41 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-05 13:23:33.508 39 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 38 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 39 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 38 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 39 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 38 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 39 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.508 38 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 39 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 38 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 39 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 38 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 39 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 38 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 39 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.509 38 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-05 13:23:33.510 39 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.510 39 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.510 39 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.510 41 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.510 39 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.510 41 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.510 39 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.510 41 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.510 39 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.511 39 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.511 39 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.511 39 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.511 39 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.511 38 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.512 39 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.512 38 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.512 39 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.512 38 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.512 39 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.512 40 INFO tempest [-] Using tempest config file /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf 2020-12-05 13:23:33.513 39 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.513 39 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.513 39 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.513 39 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.514 39 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.514 39 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.514 39 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.514 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: barbican_tests 2020-12-05 13:23:33.514 39 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.514 39 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.514 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: heat 2020-12-05 13:23:33.515 39 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.515 39 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.515 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: keystone_tests 2020-12-05 13:23:33.515 39 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.515 39 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.515 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cinder_tests 2020-12-05 13:23:33.516 39 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.516 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: neutron_tests 2020-12-05 13:23:33.516 39 DEBUG tempest [-] validation.network_for_ssh = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.516 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.516 39 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.516 39 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.516 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: patrole_tests 2020-12-05 13:23:33.516 39 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.517 39 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.517 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.517 39 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.517 39 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.517 39 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.517 40 INFO tempest.test_discover.plugins [-] Register additional config options from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.517 39 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.517 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: barbican_tests 2020-12-05 13:23:33.518 39 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.518 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: heat 2020-12-05 13:23:33.518 39 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.518 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: keystone_tests 2020-12-05 13:23:33.518 39 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.518 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cinder_tests 2020-12-05 13:23:33.518 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: neutron_tests 2020-12-05 13:23:33.518 39 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.518 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: telemetry_tests 2020-12-05 13:23:33.518 39 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.518 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: patrole_tests 2020-12-05 13:23:33.519 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.519 39 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.519 40 INFO tempest.test_discover.plugins [-] List additional config options registered by Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.519 39 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.519 39 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.519 40 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2567 2020-12-05 13:23:33.519 40 DEBUG tempest [-] Configuration options gathered from: log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2568 2020-12-05 13:23:33.519 39 DEBUG tempest [-] volume.max_microversion = 3.62 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.519 39 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.519 40 DEBUG tempest [-] command line args: [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2569 2020-12-05 13:23:33.520 39 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.520 40 DEBUG tempest [-] config files: ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2570 2020-12-05 13:23:33.520 39 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.520 40 DEBUG tempest [-] ================================================================================ log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2572 2020-12-05 13:23:33.520 39 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.520 40 DEBUG tempest [-] config_dir = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.520 40 DEBUG tempest [-] config_file = ['/root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.conf'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.520 39 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.520 40 DEBUG tempest [-] config_source = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.520 39 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.521 40 DEBUG tempest [-] debug = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.521 39 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.521 39 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.521 40 DEBUG tempest [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'oslo_messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN', 'urllib3.connectionpool=WARN', 'websocket=WARN', 'requests.packages.urllib3.util.retry=WARN', 'urllib3.util.retry=WARN', 'keystonemiddleware=WARN', 'routes.middleware=WARN', 'stevedore=WARN', 'taskflow=WARN', 'keystoneauth=WARN', 'oslo.cache=INFO', 'oslo_policy=INFO', 'dogpile.core.dogpile=INFO'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.521 39 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.521 40 DEBUG tempest [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.521 39 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.521 40 DEBUG tempest [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.521 39 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.522 40 DEBUG tempest [-] log_config_append = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.522 39 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.522 40 DEBUG tempest [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.522 39 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.522 40 DEBUG tempest [-] log_dir = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.522 39 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.522 40 DEBUG tempest [-] log_file = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/tempest.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.522 39 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.522 40 DEBUG tempest [-] log_rotate_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.523 39 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.523 40 DEBUG tempest [-] log_rotate_interval_type = days log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.523 39 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.523 40 DEBUG tempest [-] log_rotation_type = none log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.523 39 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.523 40 DEBUG tempest [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.523 40 DEBUG tempest [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.523 39 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.523 40 DEBUG tempest [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.523 39 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.523 40 DEBUG tempest [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.524 39 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.524 40 DEBUG tempest [-] logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.524 39 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.524 40 DEBUG tempest [-] max_logfile_count = 30 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.524 39 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.524 40 DEBUG tempest [-] max_logfile_size_mb = 200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.524 39 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.524 40 DEBUG tempest [-] pause_teardown = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.524 39 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.524 40 DEBUG tempest [-] publish_errors = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.525 39 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.525 40 DEBUG tempest [-] rate_limit_burst = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.525 39 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.525 40 DEBUG tempest [-] rate_limit_except_level = CRITICAL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.525 39 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.525 40 DEBUG tempest [-] rate_limit_interval = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.525 39 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.525 40 DEBUG tempest [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.525 40 DEBUG tempest [-] use_eventlog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.525 39 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.526 40 DEBUG tempest [-] use_journal = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.526 39 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.526 40 DEBUG tempest [-] use_json = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.526 39 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.526 40 DEBUG tempest [-] use_stderr = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.526 39 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-05 13:23:33.526 40 DEBUG tempest [-] use_syslog = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.526 40 DEBUG tempest [-] watch_log_file = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2580 2020-12-05 13:23:33.526 39 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 40 DEBUG tempest [-] oslo_concurrency.disable_process_locking = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 39 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 40 DEBUG tempest [-] oslo_concurrency.lock_path = /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/for-deployment-f670a5ad-ad73-48e7-bd2b-958a3a8aeca7/lock_files log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 39 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 40 DEBUG tempest [-] auth.admin_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 39 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 40 DEBUG tempest [-] auth.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 39 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 40 DEBUG tempest [-] auth.admin_project_name = patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.527 39 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 40 DEBUG tempest [-] auth.admin_username = patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 39 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 40 DEBUG tempest [-] auth.create_isolated_networks = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 39 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 40 DEBUG tempest [-] auth.default_credentials_domain_name = Default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 39 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 40 DEBUG tempest [-] auth.tempest_roles = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 39 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 40 DEBUG tempest [-] auth.test_accounts_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.528 39 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 40 DEBUG tempest [-] auth.use_dynamic_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 39 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 40 DEBUG tempest [-] compute.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 39 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 40 DEBUG tempest [-] compute.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 39 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 40 DEBUG tempest [-] compute.catalog_type = compute log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 39 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 40 DEBUG tempest [-] compute.certified_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.529 39 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 40 DEBUG tempest [-] compute.certified_image_trusted_certs = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 39 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 40 DEBUG tempest [-] compute.compute_volume_common_az = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 39 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 40 DEBUG tempest [-] compute.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 39 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 40 DEBUG tempest [-] compute.fixed_network_name = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 39 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 40 DEBUG tempest [-] compute.flavor_ref = 7f08d304-dde5-4abb-ab77-f7ebcff62b95 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.530 39 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 40 DEBUG tempest [-] compute.flavor_ref_alt = e799f7f2-ff32-4186-bcdc-11f1dd3a8fd5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 39 DEBUG tempest [-] placement.max_microversion = 1.36 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 40 DEBUG tempest [-] compute.hypervisor_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 39 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 40 DEBUG tempest [-] compute.image_ref = ea31bd24-c485-4379-b2df-6f414a2f50d9 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 39 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 40 DEBUG tempest [-] compute.image_ref_alt = e54414df-227d-4fb4-a571-34577fa0a85c log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 39 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 40 DEBUG tempest [-] compute.max_microversion = 2.87 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.531 39 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 40 DEBUG tempest [-] compute.min_compute_nodes = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 39 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 40 DEBUG tempest [-] compute.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 39 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 40 DEBUG tempest [-] compute.ready_wait = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 39 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 40 DEBUG tempest [-] compute.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 39 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 40 DEBUG tempest [-] compute.shelved_offload_time = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.532 39 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 40 DEBUG tempest [-] compute.volume_device_name = sdb log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 39 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 40 DEBUG tempest [-] compute-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 39 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 40 DEBUG tempest [-] compute-feature-enabled.attach_encrypted_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 39 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 39 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.533 40 WARNING oslo_config.cfg [-] Deprecated: Option "block_migrate_cinder_iscsi" from group "compute-feature-enabled" is deprecated for removal (This option duplicates the more generic [compute-feature-enabled]/block_migration _for_live_migration now that MIN_LIBVIRT_VERSION is >= 1.2.17 on all branches from stable/rocky and will be removed in a future release.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.534 39 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 40 DEBUG tempest [-] compute-feature-enabled.block_migrate_cinder_iscsi = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 39 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 40 DEBUG tempest [-] compute-feature-enabled.block_migration_for_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 39 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 40 DEBUG tempest [-] compute-feature-enabled.can_migrate_between_any_hosts = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 39 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 40 DEBUG tempest [-] compute-feature-enabled.change_password = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 39 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 40 DEBUG tempest [-] compute-feature-enabled.cold_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.534 39 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 40 DEBUG tempest [-] compute-feature-enabled.config_drive = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 39 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 40 DEBUG tempest [-] compute-feature-enabled.console_output = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 39 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 40 DEBUG tempest [-] compute-feature-enabled.disk_config = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 39 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 40 DEBUG tempest [-] compute-feature-enabled.enable_instance_password = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 39 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 40 DEBUG tempest [-] compute-feature-enabled.interface_attach = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.535 39 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 40 DEBUG tempest [-] compute-feature-enabled.live_migrate_back_and_forth = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 39 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 40 DEBUG tempest [-] compute-feature-enabled.live_migration = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 39 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 40 DEBUG tempest [-] compute-feature-enabled.metadata_service = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 39 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 40 DEBUG tempest [-] compute-feature-enabled.nova_cert = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 39 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 40 DEBUG tempest [-] compute-feature-enabled.pause = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.536 39 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 40 DEBUG tempest [-] compute-feature-enabled.personality = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 39 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 39 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 40 WARNING oslo_config.cfg [-] Deprecated: Option "rdp_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.537 39 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 40 DEBUG tempest [-] compute-feature-enabled.rdp_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 39 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 40 DEBUG tempest [-] compute-feature-enabled.rescue = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.537 39 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 40 DEBUG tempest [-] compute-feature-enabled.resize = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 39 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 39 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 40 WARNING oslo_config.cfg [-] Deprecated: Option "scheduler_available_filters" from group "compute-feature-enabled" is deprecated. Use option "scheduler_enabled_filters" from group "compute-feature-enabled". 2020-12-05 13:23:33.538 39 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 40 DEBUG tempest [-] compute-feature-enabled.scheduler_enabled_filters = ['AvailabilityZoneFilter', 'ComputeFilter', 'ComputeCapabilitiesFilter', 'ImagePropertiesFilter', 'ServerGroupAntiAffinityFilter', 'ServerGroupAffinityFilter', 'SameHostFilter', 'DifferentHostFilter'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 39 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 40 DEBUG tempest [-] compute-feature-enabled.serial_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.538 39 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 40 DEBUG tempest [-] compute-feature-enabled.shelve = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 39 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 40 DEBUG tempest [-] compute-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 39 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 40 WARNING oslo_config.cfg [-] Deprecated: Option "spice_console" from group "compute-feature-enabled" is deprecated for removal (This config option is not being used in Tempest, we can add it back when adding the test cases.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.539 39 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 40 DEBUG tempest [-] compute-feature-enabled.spice_console = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 39 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 40 DEBUG tempest [-] compute-feature-enabled.stable_rescue = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.539 39 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 40 DEBUG tempest [-] compute-feature-enabled.suspend = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 39 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 39 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 40 DEBUG tempest [-] compute-feature-enabled.swap_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 39 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 40 DEBUG tempest [-] compute-feature-enabled.vnc_console = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 39 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 40 DEBUG tempest [-] compute-feature-enabled.vnc_server_header = WebSockify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 39 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.540 40 DEBUG tempest [-] compute-feature-enabled.volume_backed_live_migration = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 39 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 40 DEBUG tempest [-] compute-feature-enabled.volume_multiattach = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 39 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 40 DEBUG tempest [-] identity.admin_domain_scope = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 39 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 40 DEBUG tempest [-] identity.admin_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 39 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 40 DEBUG tempest [-] identity.auth_version = v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.541 39 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 40 DEBUG tempest [-] identity.ca_certificates_file = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 39 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 40 DEBUG tempest [-] identity.catalog_type = identity log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 39 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 40 DEBUG tempest [-] identity.default_domain_id = default log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 39 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 40 DEBUG tempest [-] identity.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 39 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 40 DEBUG tempest [-] identity.region = RegionOne log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.542 39 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 40 DEBUG tempest [-] identity.uri = http://172.30.13.94/identity/v2.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 39 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 40 DEBUG tempest [-] identity.uri_v3 = http://172.30.13.94/identity/v3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 39 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 40 DEBUG tempest [-] identity.user_lockout_duration = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 39 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 40 DEBUG tempest [-] identity.user_lockout_failure_attempts = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 39 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 40 DEBUG tempest [-] identity.user_unique_last_password_count = 2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.543 39 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 40 DEBUG tempest [-] identity.v2_admin_endpoint_type = adminURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 39 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 40 DEBUG tempest [-] identity.v2_public_endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 39 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 40 DEBUG tempest [-] identity.v3_endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 39 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 40 DEBUG tempest [-] service-clients.http_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 39 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 40 DEBUG tempest [-] service-clients.proxy_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.544 39 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 40 DEBUG tempest [-] identity-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 39 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 39 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 40 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "identity-feature-enabled" is deprecated for removal (The identity v2.0 API was removed in the Queens release. Tests that exercise the v2.0 API will be removed from tempest in the v22.0.0 release. They are kept only to test stable branches.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.545 39 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 40 DEBUG tempest [-] identity-feature-enabled.api_v2 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 39 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 40 DEBUG tempest [-] identity-feature-enabled.api_v2_admin = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 39 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.545 40 DEBUG tempest [-] identity-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 39 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 40 DEBUG tempest [-] identity-feature-enabled.application_credentials = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 39 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 40 DEBUG tempest [-] identity-feature-enabled.domain_specific_drivers = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 39 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 40 DEBUG tempest [-] identity-feature-enabled.external_idp = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 39 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 40 DEBUG tempest [-] identity-feature-enabled.federation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 39 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.546 40 DEBUG tempest [-] identity-feature-enabled.immutable_user_source = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 39 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 40 DEBUG tempest [-] identity-feature-enabled.project_tags = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 39 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 40 DEBUG tempest [-] identity-feature-enabled.security_compliance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 39 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 40 DEBUG tempest [-] identity-feature-enabled.trust = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 39 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 40 DEBUG tempest [-] image.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 39 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.547 40 DEBUG tempest [-] image.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 39 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 40 DEBUG tempest [-] image.catalog_type = image log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 39 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 40 DEBUG tempest [-] image.container_formats = ['ami', 'ari', 'aki', 'bare', 'ovf', 'ova'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 39 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 40 DEBUG tempest [-] image.disk_formats = ['ami', 'ari', 'aki', 'vhd', 'vmdk', 'raw', 'qcow2', 'vdi', 'iso', 'vhdx'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 39 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 40 DEBUG tempest [-] image.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.548 39 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 40 DEBUG tempest [-] image.http_image = http://download.cirros-cloud.net/0.3.1/cirros-0.3.1-x86_64-uec.tar.gz log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 39 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 40 DEBUG tempest [-] image.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 39 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 39 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 40 WARNING oslo_config.cfg [-] Deprecated: Option "api_v1" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.549 39 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 40 DEBUG tempest [-] image-feature-enabled.api_v1 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.549 39 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 40 WARNING oslo_config.cfg [-] Deprecated: Option "api_v2" from group "image-feature-enabled" is deprecated for removal (Glance v1 APIs are deprecated and v2 APIs are current one. In future, Tempest will test v2 APIs only so this config option will be removed.). Its value may be silently ignored in the future. 2020-12-05 13:23:33.550 39 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 39 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 40 DEBUG tempest [-] image-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 39 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 40 DEBUG tempest [-] image-feature-enabled.import_image = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 39 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 40 DEBUG tempest [-] network.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.550 39 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 40 DEBUG tempest [-] network.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 39 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 40 DEBUG tempest [-] network.catalog_type = network log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 39 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 40 DEBUG tempest [-] network.default_network = ['192.168.120.0/24'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 39 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 40 DEBUG tempest [-] network.dns_servers = ['8.8.8.8', '8.8.4.4'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 39 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 40 DEBUG tempest [-] network.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.551 39 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 40 DEBUG tempest [-] network.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 39 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 40 DEBUG tempest [-] network.port_profile = {} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 39 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 40 DEBUG tempest [-] network.port_vnic_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 39 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 40 DEBUG tempest [-] network.project_network_cidr = 192.168.120.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 39 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 40 DEBUG tempest [-] network.project_network_mask_bits = 28 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.552 39 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 40 DEBUG tempest [-] network.project_network_v6_cidr = 2001:db8::/48 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 39 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 40 DEBUG tempest [-] network.project_network_v6_mask_bits = 64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 39 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 40 DEBUG tempest [-] network.project_networks_reachable = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 39 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 40 DEBUG tempest [-] network.public_network_id = 3fe4fc32-89a3-4f72-b166-6eb7100e1fea log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 39 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 40 DEBUG tempest [-] network.public_router_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.553 39 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 40 DEBUG tempest [-] network.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 39 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 40 DEBUG tempest [-] network.shared_physical_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 39 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 40 DEBUG tempest [-] network.subnet_id = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 39 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 39 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.554 40 DEBUG tempest [-] network-feature-enabled.api_extensions = ['address-group', 'address-scope', 'router-admin-state-down-before-update', 'agent', 'agent-resources-synced', 'allowed-address-pairs', 'auto-allocated-topology', 'availability_zone', 'availability_zone_filter', 'default-subnetpools', 'dhcp_agent_scheduler', 'dns-integration', 'dns-domain-ports', 'dvr', 'empty-string-filtering', 'expose-port-forwarding-in-fip', 'external-net', 'extra_dhcp_opt', 'extraroute', 'extraroute-atomic', 'filter-validation', 'floating-ip-port-forwarding-description', 'fip-port-details', 'flavors', 'floating-ip-port-forwarding', 'floatingip-pools', 'ip_allocation', 'ip-substring-filtering', 'l2_adjacency', 'router', 'ext-gw-mode', 'l3-ha', 'l3-flavors', 'l3-port-ip-change-not-allowed', 'l3_agent_scheduler', 'logging', 'multi-provider', 'net-mtu', 'net-mtu-writable', 'network_availability_zone', 'network-ip-availability', 'pagination', 'port-mac-address-regenerate', 'port-resource-request', 'binding', 'binding-extended', 'port-security', 'project-id', 'provider', 'qos', 'qos-bw-limit-direction', 'qos-bw-minimum-ingress', 'qos-default', 'qos-fip', 'qos-gateway-ip', 'qos-port-network-policy', 'qos-rule-type-details', 'qos-rules-alias', 'quotas', 'quota_details', 'rbac-policies', 'rbac-address-scope', 'rbac-security-groups', 'rbac-subnetpool', 'revision-if-match', 'standard-attr-revisions', 'router_availability_zone', 'port-security-groups-filtering', 'security-group', 'segment', 'segments-peer-subnet-host-routes', 'service-type', 'sorting', 'standard-attr-segment', 'standard-attr-description', 'stateful-security-group', 'subnet-dns-publish-fixed-ip', 'subnet_onboard', 'subnet-segmentid-writable', 'subnet-service-types', 'subnet_allocation', 'subnetpool-prefix-ops', 'standard-attr-tag', 'standard-attr-timestamp', 'trunk', 'trunk-details'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 39 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 40 DEBUG tempest [-] network-feature-enabled.floating_ips = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 39 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 40 DEBUG tempest [-] network-feature-enabled.ipv6 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 39 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 40 DEBUG tempest [-] network-feature-enabled.ipv6_subnet_attributes = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 39 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 40 DEBUG tempest [-] network-feature-enabled.port_admin_state_change = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 39 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.555 40 DEBUG tempest [-] network-feature-enabled.port_security = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 39 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 40 DEBUG tempest [-] network-feature-enabled.provider_net_base_segmentation_id = 3000 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 39 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 40 DEBUG tempest [-] network-feature-enabled.qos_placement_physnet = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 39 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 40 DEBUG tempest [-] validation.auth_method = keypair log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 39 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 40 DEBUG tempest [-] validation.connect_method = floating log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 39 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.556 40 DEBUG tempest [-] validation.connect_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 39 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 40 DEBUG tempest [-] validation.floating_ip_range = 10.0.0.0/29 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 39 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 40 DEBUG tempest [-] validation.image_ssh_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 39 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 40 DEBUG tempest [-] validation.image_ssh_user = cirros log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 39 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 40 DEBUG tempest [-] validation.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.557 39 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 40 DEBUG tempest [-] validation.network_for_ssh = patrole_member-net_d465c2ad-4b65-4ce6-8c54-94723b36e88d log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 39 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 40 DEBUG tempest [-] validation.ping_count = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 39 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 40 DEBUG tempest [-] validation.ping_size = 56 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 39 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 40 DEBUG tempest [-] validation.ping_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 39 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 40 DEBUG tempest [-] validation.run_validation = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.558 39 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 40 DEBUG tempest [-] validation.security_group = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 39 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 40 DEBUG tempest [-] validation.security_group_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 39 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 40 DEBUG tempest [-] validation.ssh_shell_prologue = set -eu -o pipefail; PATH=$PATH:/sbin:/usr/sbin; log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 39 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 40 DEBUG tempest [-] validation.ssh_timeout = 196 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 39 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 40 DEBUG tempest [-] volume.backend_names = ['BACKEND_1', 'BACKEND_2'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.559 39 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 40 DEBUG tempest [-] volume.build_interval = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 39 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 40 DEBUG tempest [-] volume.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 39 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 40 DEBUG tempest [-] volume.catalog_type = volumev3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 39 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 40 DEBUG tempest [-] volume.disk_format = raw log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 39 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.560 40 DEBUG tempest [-] volume.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.561 39 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.561 40 DEBUG tempest [-] volume.manage_snapshot_ref = ['source-name', 'snapshot-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.561 39 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.561 39 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-05 13:23:33.561 40 DEBUG tempest [-] volume.manage_volume_ref = ['source-name', 'volume-%s'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.561 40 DEBUG tempest [-] volume.max_microversion = 3.62 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.561 40 DEBUG tempest [-] volume.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.562 40 DEBUG tempest [-] volume.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.562 40 DEBUG tempest [-] volume.storage_protocol = ceph log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.562 40 DEBUG tempest [-] volume.vendor_name = Open Source log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.562 40 DEBUG tempest [-] volume.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.562 40 DEBUG tempest [-] volume-feature-enabled.api_extensions = ['all'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.563 40 DEBUG tempest [-] volume-feature-enabled.api_v2 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.563 40 DEBUG tempest [-] volume-feature-enabled.api_v3 = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.563 40 DEBUG tempest [-] volume-feature-enabled.backup = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.563 39 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.563 40 DEBUG tempest [-] volume-feature-enabled.clone = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.563 39 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.564 40 DEBUG tempest [-] volume-feature-enabled.consistency_group = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.564 39 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.564 40 DEBUG tempest [-] volume-feature-enabled.extend_attached_volume = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.564 40 DEBUG tempest [-] volume-feature-enabled.manage_snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.564 40 DEBUG tempest [-] volume-feature-enabled.manage_volume = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.564 40 DEBUG tempest [-] volume-feature-enabled.multi_backend = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.565 40 DEBUG tempest [-] volume-feature-enabled.snapshot = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.565 40 DEBUG tempest [-] volume-feature-enabled.volume_revert = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.565 40 DEBUG tempest [-] object-storage.catalog_type = object-store log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.565 40 DEBUG tempest [-] object-storage.cluster_name = name1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.565 40 DEBUG tempest [-] object-storage.container_sync_interval = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.566 40 DEBUG tempest [-] object-storage.container_sync_timeout = 600 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.566 40 DEBUG tempest [-] object-storage.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.566 40 DEBUG tempest [-] object-storage.operator_role = member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.566 40 DEBUG tempest [-] object-storage.realm_name = realm1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.566 40 DEBUG tempest [-] object-storage.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.567 40 DEBUG tempest [-] object-storage.reseller_admin_role = ResellerAdmin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.567 40 DEBUG tempest [-] object-storage-feature-enabled.container_sync = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.567 40 DEBUG tempest [-] object-storage-feature-enabled.discoverability = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.567 40 DEBUG tempest [-] object-storage-feature-enabled.discoverable_apis = ['account_quotas', 'formpost', 'bulk_upload', 'bulk_delete', 'tempurl', 'crossdomain', 'container_quotas', 'staticweb', 'account_quotas', 'slo'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.567 40 DEBUG tempest [-] object-storage-feature-enabled.object_versioning = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.568 40 DEBUG tempest [-] scenario.dhcp_client = udhcpc log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.568 40 DEBUG tempest [-] scenario.img_container_format = bare log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.568 40 WARNING oslo_config.cfg [-] Deprecated: Option "img_dir" from group "scenario" is deprecated for removal. Its value may be silently ignored in the future. 2020-12-05 13:23:33.568 40 DEBUG tempest [-] scenario.img_dir = /home/opnfv/functest/images log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.569 40 DEBUG tempest [-] scenario.img_disk_format = qcow2 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.569 40 DEBUG tempest [-] scenario.img_file = cirros-0.4.0-x86_64-disk.img log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.569 40 DEBUG tempest [-] scenario.img_properties = {'hw_scsi_model': 'virtio-scsi', 'hw_disk_bus': 'scsi'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.569 40 DEBUG tempest [-] scenario.protocol = icmp log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.570 40 DEBUG tempest [-] service_available.aodh = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.570 40 DEBUG tempest [-] service_available.barbican = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.570 40 DEBUG tempest [-] service_available.ceilometer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.570 40 DEBUG tempest [-] service_available.cinder = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.570 40 DEBUG tempest [-] service_available.cyborg = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.571 40 DEBUG tempest [-] service_available.glance = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.571 40 DEBUG tempest [-] service_available.gnocchi = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.571 40 DEBUG tempest [-] service_available.heat = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.571 40 DEBUG tempest [-] service_available.load_balancer = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.571 40 DEBUG tempest [-] service_available.neutron = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.572 40 DEBUG tempest [-] service_available.nova = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.572 40 DEBUG tempest [-] service_available.panko = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.572 40 DEBUG tempest [-] service_available.swift = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.572 40 DEBUG tempest [-] debug.trace_requests = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.572 40 DEBUG tempest [-] placement.catalog_type = placement log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.573 40 DEBUG tempest [-] placement.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.573 40 DEBUG tempest [-] placement.max_microversion = 1.36 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.573 40 DEBUG tempest [-] placement.min_microversion = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.573 40 DEBUG tempest [-] placement.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.574 40 DEBUG tempest [-] profiler.key = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.574 40 DEBUG tempest [-] ephemeral_storage_encryption.cipher = aes-xts-plain64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.574 40 DEBUG tempest [-] ephemeral_storage_encryption.enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.574 40 DEBUG tempest [-] ephemeral_storage_encryption.key_size = 256 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.574 40 DEBUG tempest [-] image_signature_verification.enforced = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.574 40 DEBUG tempest [-] heat_plugin.admin_password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.575 40 DEBUG tempest [-] heat_plugin.admin_project_name = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.575 40 DEBUG tempest [-] heat_plugin.admin_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.575 40 DEBUG tempest [-] heat_plugin.auth_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.575 40 DEBUG tempest [-] heat_plugin.auth_version = 3 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.575 40 DEBUG tempest [-] heat_plugin.boot_config_env = /usr/lib/python3.8/site-packages/heat_tempest_plugin/tests/scenario/templates/boot_config_none_env.yaml log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.576 40 DEBUG tempest [-] heat_plugin.build_interval = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.576 40 DEBUG tempest [-] heat_plugin.build_timeout = 1200 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.576 40 DEBUG tempest [-] heat_plugin.ca_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.576 40 DEBUG tempest [-] heat_plugin.catalog_type = orchestration log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.576 40 DEBUG tempest [-] heat_plugin.connectivity_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.576 40 DEBUG tempest [-] heat_plugin.convergence_engine_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.577 40 DEBUG tempest [-] heat_plugin.credential_secret_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.577 40 DEBUG tempest [-] heat_plugin.disable_ssl_certificate_validation = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.577 40 DEBUG tempest [-] heat_plugin.endpoint_type = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.577 40 DEBUG tempest [-] heat_plugin.fixed_network_name = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.577 40 DEBUG tempest [-] heat_plugin.fixed_subnet_name = heat-subnet log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.578 40 DEBUG tempest [-] heat_plugin.floating_network_name = public log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.578 40 DEBUG tempest [-] heat_plugin.heat_config_notify_script = heat-config-notify log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.578 40 DEBUG tempest [-] heat_plugin.hidden_stack_tag = data-processing-cluster log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.578 40 DEBUG tempest [-] heat_plugin.image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.579 40 DEBUG tempest [-] heat_plugin.instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.579 40 DEBUG tempest [-] heat_plugin.ip_version_for_ssh = 4 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.579 40 DEBUG tempest [-] heat_plugin.keypair_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.579 40 DEBUG tempest [-] heat_plugin.minimal_image_ref = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.579 40 DEBUG tempest [-] heat_plugin.minimal_instance_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.579 40 DEBUG tempest [-] heat_plugin.network_for_ssh = heat-net log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.580 40 DEBUG tempest [-] heat_plugin.password = **** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.580 40 DEBUG tempest [-] heat_plugin.project_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.580 40 DEBUG tempest [-] heat_plugin.project_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.580 40 DEBUG tempest [-] heat_plugin.project_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.580 40 DEBUG tempest [-] heat_plugin.region = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.581 40 DEBUG tempest [-] heat_plugin.skip_functional_test_list = ['EncryptionVolTypeTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.581 40 DEBUG tempest [-] heat_plugin.skip_functional_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.581 40 DEBUG tempest [-] heat_plugin.skip_scenario_test_list = ['AodhAlarmTest', 'SoftwareConfigIntegrationTest', 'VolumeBackupRestoreIntegrationTest', 'CfnInitIntegrationTest', 'LoadBalancerTest'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.581 40 DEBUG tempest [-] heat_plugin.skip_scenario_tests = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.581 40 DEBUG tempest [-] heat_plugin.skip_test_stack_action_list = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.582 40 DEBUG tempest [-] heat_plugin.ssh_channel_timeout = 60 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.582 40 DEBUG tempest [-] heat_plugin.ssh_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.582 40 DEBUG tempest [-] heat_plugin.user_domain_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.582 40 DEBUG tempest [-] heat_plugin.user_domain_name = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.582 40 DEBUG tempest [-] heat_plugin.username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.583 40 DEBUG tempest [-] heat_plugin.vm_to_heat_api_insecure = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.583 40 DEBUG tempest [-] heat_plugin.volume_size = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.583 40 DEBUG tempest [-] heat_features_enabled.multi_cloud = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.583 40 DEBUG tempest [-] heat_features_enabled.stack_cancel = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.583 40 DEBUG tempest [-] fed_scenario.enable_k2k_groups_mapping = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.584 40 DEBUG tempest [-] fed_scenario.idp_ecp_url = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.584 40 DEBUG tempest [-] fed_scenario.idp_id = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.584 40 DEBUG tempest [-] fed_scenario.idp_password = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.584 40 DEBUG tempest [-] fed_scenario.idp_remote_ids = [] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.584 40 DEBUG tempest [-] fed_scenario.idp_username = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.584 40 DEBUG tempest [-] fed_scenario.mapping_group_domain_name = federated_domain log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.585 40 DEBUG tempest [-] fed_scenario.mapping_group_name = federated_users log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.585 40 DEBUG tempest [-] fed_scenario.mapping_remote_type = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.585 40 DEBUG tempest [-] fed_scenario.mapping_user_name = {0} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.585 40 DEBUG tempest [-] fed_scenario.protocol_id = mapped log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.585 40 DEBUG tempest [-] telemetry.alarm_aggregation_method = rate:mean log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.586 40 DEBUG tempest [-] telemetry.alarm_granularity = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.586 40 DEBUG tempest [-] telemetry.alarm_metric_name = cpu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.586 40 DEBUG tempest [-] telemetry.alarm_threshold = 10 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.586 40 DEBUG tempest [-] telemetry.notification_sleep = 1 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.586 40 DEBUG tempest [-] telemetry.notification_wait = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.587 40 DEBUG tempest [-] event.catalog_type = event log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.587 40 DEBUG tempest [-] event.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.587 40 DEBUG tempest [-] alarming_plugin.catalog_type = alarming log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.587 40 DEBUG tempest [-] alarming_plugin.create_alarms = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.587 40 DEBUG tempest [-] alarming_plugin.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.587 40 DEBUG tempest [-] metric.catalog_type = metric log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.588 40 DEBUG tempest [-] metric.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.588 40 DEBUG tempest [-] patrole.custom_policy_files = ['/etc/%s/policy.json'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.588 40 DEBUG tempest [-] patrole.custom_requirements_file = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.588 40 DEBUG tempest [-] patrole.rbac_test_role = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.588 40 DEBUG tempest [-] patrole.rbac_test_roles = ['admin'] log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.589 40 DEBUG tempest [-] patrole.test_custom_requirements = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.589 40 DEBUG tempest [-] patrole.validate_deprecated_rules = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.589 40 DEBUG tempest [-] patrole_log.enable_reporting = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.589 40 DEBUG tempest [-] patrole_log.report_log_name = patrole.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.589 40 DEBUG tempest [-] patrole_log.report_log_path = . log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.590 40 DEBUG tempest [-] policy-feature-enabled.added_cinder_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.590 40 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_ussuri = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.590 40 DEBUG tempest [-] policy-feature-enabled.changed_nova_policies_victoria = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.590 40 DEBUG tempest [-] policy-feature-enabled.create_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.590 40 DEBUG tempest [-] policy-feature-enabled.keystone_policy_enforcement_train = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.591 40 DEBUG tempest [-] policy-feature-enabled.limits_extension_used_limits_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.591 40 DEBUG tempest [-] policy-feature-enabled.removed_keystone_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.591 40 DEBUG tempest [-] policy-feature-enabled.removed_nova_policies_stein = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.591 40 DEBUG tempest [-] policy-feature-enabled.update_port_fixed_ips_ip_address_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.591 40 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_attach_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.591 40 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_reserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.592 40 DEBUG tempest [-] policy-feature-enabled.volume_extension_volume_actions_unreserve_policy = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.592 40 DEBUG tempest [-] load_balancer.RBAC_test_type = advanced log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.592 40 DEBUG tempest [-] load_balancer.admin_role = load-balancer_admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.592 40 DEBUG tempest [-] load_balancer.amphora_admin_log_file = /var/log/octavia-amphora.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.592 40 DEBUG tempest [-] load_balancer.amphora_ssh_key = /etc/octavia/.ssh/octavia_ssh_key log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.593 40 DEBUG tempest [-] load_balancer.amphora_ssh_user = ubuntu log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.593 40 DEBUG tempest [-] load_balancer.availability_zone = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.593 40 DEBUG tempest [-] load_balancer.availability_zone2 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.593 40 DEBUG tempest [-] load_balancer.availability_zone3 = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.593 40 DEBUG tempest [-] load_balancer.build_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.594 40 DEBUG tempest [-] load_balancer.build_timeout = 300 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.594 40 DEBUG tempest [-] load_balancer.catalog_type = load-balancer log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.594 40 DEBUG tempest [-] load_balancer.check_interval = 5.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.594 40 DEBUG tempest [-] load_balancer.check_timeout = 120 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.594 40 DEBUG tempest [-] load_balancer.disable_boot_network = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.595 40 DEBUG tempest [-] load_balancer.enable_security_groups = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.595 40 DEBUG tempest [-] load_balancer.enabled_provider_drivers = {'amphora': 'The Octavia Amphora driver.', 'amphorav2': 'The Octavia Amphora driver that uses taskflow jobboard persistence.', 'octavia': 'Deprecated alias of the Octavia Amphora driver.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.595 40 DEBUG tempest [-] load_balancer.endpoint_type = publicURL log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.595 40 DEBUG tempest [-] load_balancer.expected_availability_zone_capability = {'compute_zone': 'The compute availability zone.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.595 40 DEBUG tempest [-] load_balancer.expected_flavor_capability = {'loadbalancer_topology': 'The load balancer topology. One of: SINGLE - One amphora per load balancer. ACTIVE_STANDBY - Two amphora per load balancer.'} log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.595 40 DEBUG tempest [-] load_balancer.lb_build_interval = 10.0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.596 40 DEBUG tempest [-] load_balancer.lb_build_timeout = 900 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.596 40 DEBUG tempest [-] load_balancer.loadbalancer_topology = SINGLE log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.596 40 DEBUG tempest [-] load_balancer.member_1_ipv4_subnet_cidr = 10.2.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.596 40 DEBUG tempest [-] load_balancer.member_1_ipv6_subnet_cidr = fd7b:f9f7:0fff:4eca::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.596 40 DEBUG tempest [-] load_balancer.member_2_ipv4_subnet_cidr = 10.2.2.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.597 40 DEBUG tempest [-] load_balancer.member_2_ipv6_subnet_cidr = fd77:1457:4cf0:26a8::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.597 40 DEBUG tempest [-] load_balancer.member_role = load-balancer_member log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.597 40 DEBUG tempest [-] load_balancer.octavia_svc_username = admin log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.597 40 DEBUG tempest [-] load_balancer.provider = octavia log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.597 40 DEBUG tempest [-] load_balancer.random_server_name_length = 0 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.598 40 DEBUG tempest [-] load_balancer.region = log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.598 40 DEBUG tempest [-] load_balancer.scp_connection_attempts = 20 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.598 40 DEBUG tempest [-] load_balancer.scp_connection_timeout = 5 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.598 40 DEBUG tempest [-] load_balancer.tenant_flow_log_file = /var/log/octavia-tenant-traffic.log log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.599 40 DEBUG tempest [-] load_balancer.test_ipv6_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.599 40 DEBUG tempest [-] load_balancer.test_network_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.599 40 DEBUG tempest [-] load_balancer.test_reuse_connection = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.599 40 DEBUG tempest [-] load_balancer.test_subnet_override = None log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.599 40 DEBUG tempest [-] load_balancer.test_with_ipv6 = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.599 40 DEBUG tempest [-] load_balancer.test_with_noop = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.600 40 DEBUG tempest [-] load_balancer.vip_ipv6_subnet_cidr = fdde:1a92:7523:70a0::/64 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.600 40 DEBUG tempest [-] load_balancer.vip_subnet_cidr = 10.1.1.0/24 log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.600 40 DEBUG tempest [-] loadbalancer-feature-enabled.health_monitor_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.600 40 DEBUG tempest [-] loadbalancer-feature-enabled.l4_protocol = TCP log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.600 40 DEBUG tempest [-] loadbalancer-feature-enabled.l7_protocol_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.601 40 DEBUG tempest [-] loadbalancer-feature-enabled.log_offload_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.601 40 DEBUG tempest [-] loadbalancer-feature-enabled.not_implemented_is_error = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.601 40 DEBUG tempest [-] loadbalancer-feature-enabled.pool_algorithms_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.601 40 DEBUG tempest [-] loadbalancer-feature-enabled.session_persistence_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.601 40 DEBUG tempest [-] loadbalancer-feature-enabled.spare_pool_enabled = False log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.602 40 DEBUG tempest [-] loadbalancer-feature-enabled.terminated_tls_enabled = True log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2587 2020-12-05 13:23:33.602 40 DEBUG tempest [-] ******************************************************************************** log_opt_values /usr/lib/python3.8/site-packages/oslo_config/cfg.py:2591 2020-12-05 13:23:33.604 40 DEBUG tempest.lib.services.clients [-] Successfully registered plugin __tempest__ in the service client registry with configuration: [{'name': 'compute', 'service_version': 'compute', 'module_path': 'tempest.lib.services.compute', 'client_names': ['AgentsClient', 'AggregatesClient', 'AvailabilityZoneClient', 'BaremetalNodesClient', 'CertificatesClient', 'ExtensionsClient', 'FixedIPsClient', 'FlavorsClient', 'FloatingIPPoolsClient', 'FloatingIPsBulkClient', 'FloatingIPsClient', 'HostsClient', 'HypervisorClient', 'ImagesClient', 'InstanceUsagesAuditLogClient', 'InterfacesClient', 'KeyPairsClient', 'LimitsClient', 'MigrationsClient', 'NetworksClient', 'QuotaClassesClient', 'QuotasClient', 'SecurityGroupDefaultRulesClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'ServerGroupsClient', 'ServersClient', 'ServicesClient', 'SnapshotsClient', 'TenantNetworksClient', 'TenantUsagesClient', 'VersionsClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'compute'}, {'name': 'placement', 'service_version': 'placement', 'module_path': 'tempest.lib.services.placement', 'client_names': ['PlacementClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'placement'}, {'name': 'identity_v2', 'service_version': 'identity.v2', 'module_path': 'tempest.lib.services.identity.v2', 'client_names': ['EndpointsClient', 'IdentityClient', 'RolesClient', 'ServicesClient', 'TenantsClient', 'TokenClient', 'UsersClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'identity_v3', 'service_version': 'identity.v3', 'module_path': 'tempest.lib.services.identity.v3', 'client_names': ['ApplicationCredentialsClient', 'CatalogClient', 'CredentialsClient', 'DomainsClient', 'DomainConfigurationClient', 'EndPointGroupsClient', 'EndPointsClient', 'EndPointsFilterClient', 'GroupsClient', 'IdentityClient', 'InheritedRolesClient', 'OAUTHConsumerClient', 'OAUTHTokenClient', 'PoliciesClient', 'ProjectsClient', 'ProjectTagsClient', 'RegionsClient', 'RoleAssignmentsClient', 'RolesClient', 'ServicesClient', 'V3TokenClient', 'TrustsClient', 'UsersClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'identity'}, {'name': 'image_v1', 'service_version': 'image.v1', 'module_path': 'tempest.lib.services.image.v1', 'client_names': ['ImageMembersClient', 'ImagesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'image_v2', 'service_version': 'image.v2', 'module_path': 'tempest.lib.services.image.v2', 'client_names': ['ImageMembersClient', 'ImagesClient', 'NamespaceObjectsClient', 'NamespacePropertiesClient', 'NamespaceTagsClient', 'NamespacesClient', 'ResourceTypesClient', 'SchemasClient', 'VersionsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'image'}, {'name': 'network', 'service_version': 'network', 'module_path': 'tempest.lib.services.network', 'client_names': ['AgentsClient', 'ExtensionsClient', 'FloatingIPsClient', 'MeteringLabelRulesClient', 'MeteringLabelsClient', 'NetworksClient', 'NetworkVersionsClient', 'PortsClient', 'QosClient', 'QosMinimumBandwidthRulesClient', 'QuotasClient', 'RoutersClient', 'SecurityGroupRulesClient', 'SecurityGroupsClient', 'SegmentsClient', 'ServiceProvidersClient', 'SubnetpoolsClient', 'SubnetsClient', 'TagsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'network'}, {'name': 'object_storage', 'service_version': 'object-storage', 'module_path': 'tempest.lib.services.object_storage', 'client_names': ['AccountClient', 'BulkMiddlewareClient', 'CapabilitiesClient', 'ContainerClient', 'ObjectClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'object-store'}, {'name': 'volume_v1', 'service_version': 'volume.v1', 'module_path': 'tempest.lib.services.volume.v1', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v2', 'service_version': 'volume.v2', 'module_path': 'tempest.lib.services.volume.v2', 'client_names': ['AvailabilityZoneClient', 'BackupsClient', 'EncryptionTypesClient', 'ExtensionsClient', 'HostsClient', 'QosSpecsClient', 'QuotasClient', 'ServicesClient', 'SnapshotsClient', 'TypesClient', 'VolumesClient', 'LimitsClient', 'CapabilitiesClient', 'SchedulerStatsClient', 'SnapshotManageClient', 'VolumeManageClient', 'TransfersClient', 'QuotaClassesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}, {'name': 'volume_v3', 'service_version': 'volume.v3', 'module_path': 'tempest.lib.services.volume.v3', 'client_names': ['AttachmentsClient', 'AvailabilityZoneClient', 'BackupsClient', 'BaseClient', 'CapabilitiesClient', 'EncryptionTypesClient', 'ExtensionsClient', 'GroupSnapshotsClient', 'GroupTypesClient', 'GroupsClient', 'HostsClient', 'LimitsClient', 'MessagesClient', 'QosSpecsClient', 'QuotaClassesClient', 'QuotasClient', 'SchedulerStatsClient', 'ServicesClient', 'SnapshotManageClient', 'SnapshotsClient', 'TransfersClient', 'TypesClient', 'VersionsClient', 'VolumeManageClient', 'VolumesClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'public', 'build_timeout': 300, 'build_interval': 1, 'region': 'RegionOne', 'service': 'volumev3'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.604 40 DEBUG tempest.lib.services.clients [-] Successfully registered plugin barbican_tests in the service client registry with configuration: [{'name': 'secret_v1', 'service_version': 'secret.v1', 'module_path': 'barbican_tempest_plugin.services.key_manager.json', 'client_names': ['ConsumerClient', 'ContainerClient', 'OrderClient', 'QuotaClient', 'SecretClient', 'SecretMetadataClient']}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.604 40 DEBUG tempest.lib.services.clients [-] Successfully registered plugin octavia-tempest-plugin in the service client registry with configuration: [{'name': 'load-balancer_v2', 'service_version': 'load-balancer.v2', 'module_path': 'octavia_tempest_plugin.services.load_balancer.v2', 'client_names': ['LoadbalancerClient'], 'disable_ssl_certificate_validation': False, 'ca_certs': '', 'trace_requests': '', 'http_timeout': 60, 'proxy_url': None, 'endpoint_type': 'publicURL', 'build_timeout': 300, 'build_interval': 5.0, 'region': 'RegionOne', 'service': 'load-balancer'}] register_service_client /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/services/clients.py:121 2020-12-05 13:23:33.913 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-05 13:23:33.913 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-05 13:23:33.913 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-05 13:23:33.913 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-05 13:23:33.913 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-05 13:23:33.913 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-05 13:23:33.913 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-05 13:23:33.913 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-05 13:23:33.913 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-05 13:23:33.913 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-05 13:23:33.914 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.914 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.914 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-05 13:23:33.914 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-05 13:23:33.914 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.914 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.914 41 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.914 38 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:33.968 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-05 13:23:33.968 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-05 13:23:33.968 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-05 13:23:33.969 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-05 13:23:33.969 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-05 13:23:33.969 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-05 13:23:33.969 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-05 13:23:33.969 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:33.969 39 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:34.007 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: barbican_tests 2020-12-05 13:23:34.007 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: heat 2020-12-05 13:23:34.008 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: keystone_tests 2020-12-05 13:23:34.008 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cinder_tests 2020-12-05 13:23:34.008 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: neutron_tests 2020-12-05 13:23:34.008 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: telemetry_tests 2020-12-05 13:23:34.008 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: patrole_tests 2020-12-05 13:23:34.008 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: octavia-tempest-plugin 2020-12-05 13:23:34.009 40 INFO tempest.test_discover.plugins [-] Loading tests from Tempest plugin: cyborg_tempest_plugin 2020-12-05 13:23:35.086 41 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-05 13:23:35.086 41 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-05 13:23:35.142 39 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-05 13:23:35.142 39 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-05 13:23:35.160 38 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-05 13:23:35.160 38 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-05 13:23:35.179 40 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" acquired by "neutron_lib.db.api._create_context_manager" :: waited 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:355 2020-12-05 13:23:35.180 40 DEBUG oslo_concurrency.lockutils [-] Lock "context-manager" released by "neutron_lib.db.api._create_context_manager" :: held 0.000s inner /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:367 2020-12-05 13:23:35.501 41 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-05 13:23:35.582 39 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-05 13:23:35.601 38 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-05 13:23:35.605 40 WARNING patrole_tempest_plugin.rbac_rule_validation [-] Deprecated: CONF.patrole.rbac_test_role is deprecated in favor of CONF.patrole.rbac_test_roles and will be removed in future. 2020-12-05 13:23:35.954 41 INFO tempest.test [-] raised in FixedIpsRbacTest.setUpClass. Invoking tearDownClass. 2020-12-05 13:23:36.037 41 INFO tempest.lib.common.rest_client [req-c667f429-890b-48e7-9de8-070ed0f2ee0b ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:36.038 41 DEBUG tempest.lib.common.rest_client [req-c667f429-890b-48e7-9de8-070ed0f2ee0b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:35 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c667f429-890b-48e7-9de8-070ed0f2ee0b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["7dVCHkDrT9eiMXLbnTS-qA"], "expires_at": "2020-12-05T14:23:35.000000Z", "issued_at": "2020-12-05T13:23:35.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.068 39 INFO tempest.lib.common.rest_client [req-278a0592-4458-41bc-9545-8d9c40b53471 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:36.069 39 DEBUG tempest.lib.common.rest_client [req-278a0592-4458-41bc-9545-8d9c40b53471 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-278a0592-4458-41bc-9545-8d9c40b53471', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["mvOGAjaNQDCFXoB5zMFdqA"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.081 41 INFO tempest.lib.common.rest_client [req-6d99b524-ae65-4151-9e8d-a290badbe594 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-12-05 13:23:36.086 41 DEBUG tempest.lib.common.rest_client [req-6d99b524-ae65-4151-9e8d-a290badbe594 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d99b524-ae65-4151-9e8d-a290badbe594', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["hn-lMBomQPKG20cNMcl1yg"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.091 38 INFO tempest.lib.common.rest_client [req-5b36e1d4-ff47-43ef-a427-06796653e8f3 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:36.092 38 DEBUG tempest.lib.common.rest_client [req-5b36e1d4-ff47-43ef-a427-06796653e8f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b36e1d4-ff47-43ef-a427-06796653e8f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["tO4QNy8DScOCpLJtw0fPQg"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.114 39 INFO tempest.lib.common.rest_client [req-b899b96d-15f1-4b82-a33f-918809240ad2 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:36.115 39 DEBUG tempest.lib.common.rest_client [req-b899b96d-15f1-4b82-a33f-918809240ad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b899b96d-15f1-4b82-a33f-918809240ad2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["GM4mfNrPR4-fSr2CJvbQcg"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.142 41 INFO tempest.lib.common.rest_client [req-12e0a963-08a7-4c11-acb2-2009467a4f08 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.055s 2020-12-05 13:23:36.142 38 INFO tempest.lib.common.rest_client [req-7eb6f866-18bc-44df-8f43-590801ae5a57 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:36.143 41 DEBUG tempest.lib.common.rest_client [req-12e0a963-08a7-4c11-acb2-2009467a4f08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12e0a963-08a7-4c11-acb2-2009467a4f08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.143 38 DEBUG tempest.lib.common.rest_client [req-7eb6f866-18bc-44df-8f43-590801ae5a57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7eb6f866-18bc-44df-8f43-590801ae5a57', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["luT0tkLSRg6Alm4lSIy8bw"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.158 39 INFO tempest.lib.common.rest_client [req-f29c5f22-11ca-408e-87c7-5861bce0ea72 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.041s 2020-12-05 13:23:36.159 39 DEBUG tempest.lib.common.rest_client [req-f29c5f22-11ca-408e-87c7-5861bce0ea72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f29c5f22-11ca-408e-87c7-5861bce0ea72', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.198 38 INFO tempest.lib.common.rest_client [req-fe728b44-8f85-4fea-817a-65dabe7ee9c3 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-12-05 13:23:36.199 38 DEBUG tempest.lib.common.rest_client [req-fe728b44-8f85-4fea-817a-65dabe7ee9c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe728b44-8f85-4fea-817a-65dabe7ee9c3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.202 40 INFO tempest.lib.common.rest_client [req-8a590466-4e4f-4017-8b24-6218d3fdd349 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.144s 2020-12-05 13:23:36.203 40 DEBUG tempest.lib.common.rest_client [req-8a590466-4e4f-4017-8b24-6218d3fdd349 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a590466-4e4f-4017-8b24-6218d3fdd349', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["XU7RfdG6Qq6Q8R782dfDcQ"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.219 41 INFO tempest.lib.common.rest_client [req-fde6da62-a18a-492b-9c47-31c108c9560b ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.070s 2020-12-05 13:23:36.220 41 DEBUG tempest.lib.common.rest_client [req-fde6da62-a18a-492b-9c47-31c108c9560b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorExtraSpecsRbacTest-1776318986-desc", "domain_id": "default", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fde6da62-a18a-492b-9c47-31c108c9560b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "domain_id": "default", "description": "tempest-FlavorExtraSpecsRbacTest-1776318986-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.237 39 INFO tempest.lib.common.rest_client [req-1fa803fd-0b6c-4102-af83-3ff174799bcb ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.069s 2020-12-05 13:23:36.238 39 DEBUG tempest.lib.common.rest_client [req-1fa803fd-0b6c-4102-af83-3ff174799bcb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AgentsRbacTest-1968029398-desc", "domain_id": "default", "name": "tempest-AgentsRbacTest-1968029398"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1fa803fd-0b6c-4102-af83-3ff174799bcb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398", "domain_id": "default", "description": "tempest-AgentsRbacTest-1968029398-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.296 40 INFO tempest.lib.common.rest_client [req-f0859be6-108b-482c-9c07-e4dba5c9b6aa ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:36.297 40 DEBUG tempest.lib.common.rest_client [req-f0859be6-108b-482c-9c07-e4dba5c9b6aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f0859be6-108b-482c-9c07-e4dba5c9b6aa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["LowAXB3HSNys3HdMZ-yi2g"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.316 38 INFO tempest.lib.common.rest_client [req-d12cfd95-ca0b-4706-8507-1d359d4df233 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.112s 2020-12-05 13:23:36.316 38 DEBUG tempest.lib.common.rest_client [req-d12cfd95-ca0b-4706-8507-1d359d4df233 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesMetadataRbacTest-906139197-desc", "domain_id": "default", "name": "tempest-ImagesMetadataRbacTest-906139197"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '380', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d12cfd95-ca0b-4706-8507-1d359d4df233', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197", "domain_id": "default", "description": "tempest-ImagesMetadataRbacTest-906139197-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.319 41 INFO tempest.lib.common.rest_client [req-c3c8daa9-867a-4bae-9a6b-be0bdf86d7eb ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.097s 2020-12-05 13:23:36.319 41 DEBUG tempest.lib.common.rest_client [req-c3c8daa9-867a-4bae-9a6b-be0bdf86d7eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password": "G9&cI5ILwd39Ucp", "project_id": "ddbd93eba47145c191192a68a3b059c4", "email": "tempest-FlavorExtraSpecsRbacTest-1734715952@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '404', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3c8daa9-867a-4bae-9a6b-be0bdf86d7eb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "ddbd93eba47145c191192a68a3b059c4", "email": "tempest-FlavorExtraSpecsRbacTest-1734715952@example.com", "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/45ac9e9e326c499eb352355a745c51d7"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.339 39 INFO tempest.lib.common.rest_client [req-058cd146-e1b7-4c54-b62d-692a09a581a5 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.099s 2020-12-05 13:23:36.339 39 DEBUG tempest.lib.common.rest_client [req-058cd146-e1b7-4c54-b62d-692a09a581a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AgentsRbacTest-1968029398", "password": "P3+CjsTJTbPRDh9", "project_id": "6f6f90ba585042b5a78c3b1a530c37cb", "email": "tempest-AgentsRbacTest-1958382391@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-058cd146-e1b7-4c54-b62d-692a09a581a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6f6f90ba585042b5a78c3b1a530c37cb", "email": "tempest-AgentsRbacTest-1958382391@example.com", "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c7513c4805334d7d994ea8f1b4d45d2b"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.346 40 INFO tempest.lib.common.rest_client [req-2bbf8359-1458-4745-93ee-83aa50521492 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-12-05 13:23:36.346 40 DEBUG tempest.lib.common.rest_client [req-2bbf8359-1458-4745-93ee-83aa50521492 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2bbf8359-1458-4745-93ee-83aa50521492', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.414 41 INFO tempest.lib.common.rest_client [req-3ed083de-5483-4796-ad24-b97d20fdb07e ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.094s 2020-12-05 13:23:36.415 41 DEBUG tempest.lib.common.rest_client [req-3ed083de-5483-4796-ad24-b97d20fdb07e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ed083de-5483-4796-ad24-b97d20fdb07e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.419 39 INFO tempest.lib.common.rest_client [req-d7b521b8-a0ed-45d0-bcc8-05cb5089bcff ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.079s 2020-12-05 13:23:36.420 39 DEBUG tempest.lib.common.rest_client [req-d7b521b8-a0ed-45d0-bcc8-05cb5089bcff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7b521b8-a0ed-45d0-bcc8-05cb5089bcff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.445 38 INFO tempest.lib.common.rest_client [req-6114a124-408c-4995-9fcd-bbe16f2242df ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.127s 2020-12-05 13:23:36.446 38 DEBUG tempest.lib.common.rest_client [req-6114a124-408c-4995-9fcd-bbe16f2242df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesMetadataRbacTest-906139197", "password": "Q4~8L_~=rdUrfzy", "project_id": "929d836cca034597b6b7e7567529d2b2", "email": "tempest-ImagesMetadataRbacTest-928215857@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6114a124-408c-4995-9fcd-bbe16f2242df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "929d836cca034597b6b7e7567529d2b2", "email": "tempest-ImagesMetadataRbacTest-928215857@example.com", "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d51bb5edbd1c4b7c84c4f13df505322d"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.461 41 INFO tempest.lib.common.rest_client [req-e23bb4b0-3f1c-430f-874b-fb70ae5eed5f ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-12-05 13:23:36.462 41 DEBUG tempest.lib.common.rest_client [req-e23bb4b0-3f1c-430f-874b-fb70ae5eed5f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e23bb4b0-3f1c-430f-874b-fb70ae5eed5f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.465 39 INFO tempest.lib.common.rest_client [req-3cd67f49-3099-410c-80b5-b376d97a3050 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-12-05 13:23:36.466 39 DEBUG tempest.lib.common.rest_client [req-3cd67f49-3099-410c-80b5-b376d97a3050 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3cd67f49-3099-410c-80b5-b376d97a3050', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.475 40 INFO tempest.lib.common.rest_client [req-5358bcff-68d6-47f7-b90a-bea0b351a919 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.120s 2020-12-05 13:23:36.476 40 DEBUG tempest.lib.common.rest_client [req-5358bcff-68d6-47f7-b90a-bea0b351a919 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-AggregatesRbacTest-2048764523-desc", "domain_id": "default", "name": "tempest-AggregatesRbacTest-2048764523"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5358bcff-68d6-47f7-b90a-bea0b351a919', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523", "domain_id": "default", "description": "tempest-AggregatesRbacTest-2048764523-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.497 38 INFO tempest.lib.common.rest_client [req-ec449841-edf2-47d6-9e94-cbcb65c72c90 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-05 13:23:36.497 38 DEBUG tempest.lib.common.rest_client [req-ec449841-edf2-47d6-9e94-cbcb65c72c90 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec449841-edf2-47d6-9e94-cbcb65c72c90', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.566 41 INFO tempest.lib.common.rest_client [req-e92c5e7b-80e7-47af-8d82-2fe113a76301 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles/72a4576c553448cd941b052c1ca0cf2d 0.104s 2020-12-05 13:23:36.567 41 DEBUG tempest.lib.common.rest_client [req-e92c5e7b-80e7-47af-8d82-2fe113a76301 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e92c5e7b-80e7-47af-8d82-2fe113a76301', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.567 41 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorExtraSpecsRbacTest-1776318986', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ddbd93eba47145c191192a68a3b059c4', 'project_name': 'tempest-FlavorExtraSpecsRbacTest-1776318986', 'tenant_id': 'ddbd93eba47145c191192a68a3b059c4', 'tenant_name': 'tempest-FlavorExtraSpecsRbacTest-1776318986', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '45ac9e9e326c499eb352355a745c51d7'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.568 41 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorExtraSpecsRbacTest-1776318986', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'ddbd93eba47145c191192a68a3b059c4', 'project_name': 'tempest-FlavorExtraSpecsRbacTest-1776318986', 'tenant_id': 'ddbd93eba47145c191192a68a3b059c4', 'tenant_name': 'tempest-FlavorExtraSpecsRbacTest-1776318986', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '45ac9e9e326c499eb352355a745c51d7'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.580 40 INFO tempest.lib.common.rest_client [req-d45b4a19-a064-4101-85f6-7c9b3eec22b5 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.103s 2020-12-05 13:23:36.581 40 DEBUG tempest.lib.common.rest_client [req-d45b4a19-a064-4101-85f6-7c9b3eec22b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-AggregatesRbacTest-2048764523", "password": "J1~CDIC!cuS#!%2", "project_id": "b1a94d6526274eb5b6f9a275c01b4cef", "email": "tempest-AggregatesRbacTest-1216042694@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d45b4a19-a064-4101-85f6-7c9b3eec22b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "b1a94d6526274eb5b6f9a275c01b4cef", "email": "tempest-AggregatesRbacTest-1216042694@example.com", "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/6d140358d164458ab6f7be3edc1f990a"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.587 39 INFO tempest.lib.common.rest_client [req-dfce95b0-552a-4f19-9f4d-696b3dabca51 ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles/72a4576c553448cd941b052c1ca0cf2d 0.120s 2020-12-05 13:23:36.588 39 DEBUG tempest.lib.common.rest_client [req-dfce95b0-552a-4f19-9f4d-696b3dabca51 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dfce95b0-552a-4f19-9f4d-696b3dabca51', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.588 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-1968029398', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6f6f90ba585042b5a78c3b1a530c37cb', 'project_name': 'tempest-AgentsRbacTest-1968029398', 'tenant_id': '6f6f90ba585042b5a78c3b1a530c37cb', 'tenant_name': 'tempest-AgentsRbacTest-1968029398', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c7513c4805334d7d994ea8f1b4d45d2b'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.589 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AgentsRbacTest-1968029398', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6f6f90ba585042b5a78c3b1a530c37cb', 'project_name': 'tempest-AgentsRbacTest-1968029398', 'tenant_id': '6f6f90ba585042b5a78c3b1a530c37cb', 'tenant_name': 'tempest-AgentsRbacTest-1968029398', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c7513c4805334d7d994ea8f1b4d45d2b'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.658 38 INFO tempest.lib.common.rest_client [req-ec335f41-8d9c-469a-b7cc-bdefd5571785 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.159s 2020-12-05 13:23:36.658 38 DEBUG tempest.lib.common.rest_client [req-ec335f41-8d9c-469a-b7cc-bdefd5571785 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec335f41-8d9c-469a-b7cc-bdefd5571785', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.690 40 INFO tempest.lib.common.rest_client [req-c78f5df6-e520-4c19-bbc2-7018ecc444d1 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.108s 2020-12-05 13:23:36.691 40 DEBUG tempest.lib.common.rest_client [req-c78f5df6-e520-4c19-bbc2-7018ecc444d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c78f5df6-e520-4c19-bbc2-7018ecc444d1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.727 38 INFO tempest.lib.common.rest_client [req-149d2bc1-d6e8-4ebb-a3c2-b807d3359dd3 ] Request (ImagesMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-05 13:23:36.727 38 DEBUG tempest.lib.common.rest_client [req-149d2bc1-d6e8-4ebb-a3c2-b807d3359dd3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-149d2bc1-d6e8-4ebb-a3c2-b807d3359dd3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.727 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMetadataRbacTest-906139197', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '929d836cca034597b6b7e7567529d2b2', 'project_name': 'tempest-ImagesMetadataRbacTest-906139197', 'tenant_id': '929d836cca034597b6b7e7567529d2b2', 'tenant_name': 'tempest-ImagesMetadataRbacTest-906139197', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd51bb5edbd1c4b7c84c4f13df505322d'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.728 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesMetadataRbacTest-906139197', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '929d836cca034597b6b7e7567529d2b2', 'project_name': 'tempest-ImagesMetadataRbacTest-906139197', 'tenant_id': '929d836cca034597b6b7e7567529d2b2', 'tenant_name': 'tempest-ImagesMetadataRbacTest-906139197', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd51bb5edbd1c4b7c84c4f13df505322d'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.746 40 INFO tempest.lib.common.rest_client [req-81f85190-7414-4c5d-9ec2-241511399b8e ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-05 13:23:36.747 40 DEBUG tempest.lib.common.rest_client [req-81f85190-7414-4c5d-9ec2-241511399b8e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81f85190-7414-4c5d-9ec2-241511399b8e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.800 39 INFO tempest.lib.common.rest_client [req-12e9a6c0-8096-4432-bb85-b6432a42e6bf ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.101s 2020-12-05 13:23:36.801 39 DEBUG tempest.lib.common.rest_client [req-12e9a6c0-8096-4432-bb85-b6432a42e6bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12e9a6c0-8096-4432-bb85-b6432a42e6bf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["gKpTDuZPQvy88oF5RLNHbQ"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.824 41 INFO tempest.lib.common.rest_client [req-7532f807-f5d3-43b4-a52d-90e9a6195d29 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-05 13:23:36.824 41 DEBUG tempest.lib.common.rest_client [req-7532f807-f5d3-43b4-a52d-90e9a6195d29 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6579', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7532f807-f5d3-43b4-a52d-90e9a6195d29', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["r9A2N3DLRDqpuMRrbQL_kQ"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "ht _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.843 39 INFO tempest.lib.common.rest_client [req-fd56b87c-abcc-4431-9391-cc8939908b72 ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:23:36.843 39 DEBUG tempest.lib.common.rest_client [req-fd56b87c-abcc-4431-9391-cc8939908b72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd56b87c-abcc-4431-9391-cc8939908b72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["gRV8GOKmS2WXZ0ssQViC0g"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.854 41 INFO tempest.lib.common.rest_client [req-59894455-be66-47a4-8e9e-a12086a93e87 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-12-05 13:23:36.854 41 DEBUG tempest.lib.common.rest_client [req-59894455-be66-47a4-8e9e-a12086a93e87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59894455-be66-47a4-8e9e-a12086a93e87', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["-2QPLr-STd2k8nqU8OUX0A"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.872 40 INFO tempest.lib.common.rest_client [req-9737a676-1440-468f-b57b-cc41a96eddf4 ] Request (AggregatesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles/72a4576c553448cd941b052c1ca0cf2d 0.123s 2020-12-05 13:23:36.872 40 DEBUG tempest.lib.common.rest_client [req-9737a676-1440-468f-b57b-cc41a96eddf4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9737a676-1440-468f-b57b-cc41a96eddf4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.873 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AggregatesRbacTest-2048764523', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b1a94d6526274eb5b6f9a275c01b4cef', 'project_name': 'tempest-AggregatesRbacTest-2048764523', 'tenant_id': 'b1a94d6526274eb5b6f9a275c01b4cef', 'tenant_name': 'tempest-AggregatesRbacTest-2048764523', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6d140358d164458ab6f7be3edc1f990a'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.874 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-AggregatesRbacTest-2048764523', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'b1a94d6526274eb5b6f9a275c01b4cef', 'project_name': 'tempest-AggregatesRbacTest-2048764523', 'tenant_id': 'b1a94d6526274eb5b6f9a275c01b4cef', 'tenant_name': 'tempest-AggregatesRbacTest-2048764523', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '6d140358d164458ab6f7be3edc1f990a'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:36.921 39 INFO tempest.lib.common.rest_client [req-33af90a1-85fe-4906-a711-765e2c06df7f ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.068s 2020-12-05 13:23:36.922 39 DEBUG tempest.lib.common.rest_client [req-33af90a1-85fe-4906-a711-765e2c06df7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33af90a1-85fe-4906-a711-765e2c06df7f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["dgHb9qKbTO-VwpE7oePikQ"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.928 38 INFO tempest.lib.common.rest_client [req-636e92bb-c3c4-41eb-916e-d684033f39cf ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.106s 2020-12-05 13:23:36.929 38 DEBUG tempest.lib.common.rest_client [req-636e92bb-c3c4-41eb-916e-d684033f39cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6573', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-636e92bb-c3c4-41eb-916e-d684033f39cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["v0-S3hmxT3qFk7RSKbDaEA"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://1 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.954 41 INFO tempest.lib.common.rest_client [req-ddebbc2d-153b-488b-a7a9-7861ed0a1623 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:36.955 41 DEBUG tempest.lib.common.rest_client [req-ddebbc2d-153b-488b-a7a9-7861ed0a1623 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddebbc2d-153b-488b-a7a9-7861ed0a1623', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["hGftRKzVTHejtnH3Pd2lLg"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.966 38 INFO tempest.lib.common.rest_client [req-e90ad9e3-86da-4c60-a765-523bd3b40fb0 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:23:36.967 38 DEBUG tempest.lib.common.rest_client [req-e90ad9e3-86da-4c60-a765-523bd3b40fb0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e90ad9e3-86da-4c60-a765-523bd3b40fb0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["bu8K8FO6SfKSNkkdxeWvQQ"], "expires_at": "2020-12-05T14:23:36.000000Z", "issued_at": "2020-12-05T13:23:36.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:36.968 39 INFO tempest.lib.common.rest_client [req-89b5f964-4462-4557-9e85-ee34baebc10a ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-12-05 13:23:36.968 39 DEBUG tempest.lib.common.rest_client [req-89b5f964-4462-4557-9e85-ee34baebc10a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89b5f964-4462-4557-9e85-ee34baebc10a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.008 41 INFO tempest.lib.common.rest_client [req-cdaa6d16-31d8-41f0-9568-4f4a45e7586d ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-12-05 13:23:37.009 41 DEBUG tempest.lib.common.rest_client [req-cdaa6d16-31d8-41f0-9568-4f4a45e7586d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdaa6d16-31d8-41f0-9568-4f4a45e7586d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.011 38 INFO tempest.lib.common.rest_client [req-9d2d2695-baca-4f02-b50b-4d8ef7f773a9 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:37.012 38 DEBUG tempest.lib.common.rest_client [req-9d2d2695-baca-4f02-b50b-4d8ef7f773a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d2d2695-baca-4f02-b50b-4d8ef7f773a9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["TrwGtnA_SIyra7cqpQzEaQ"], "expires_at": "2020-12-05T14:23:37.000000Z", "issued_at": "2020-12-05T13:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.023 39 INFO tempest.lib.common.rest_client [req-04d54c56-d3f9-4783-95ea-07e9d6fcc26b ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-05 13:23:37.024 39 DEBUG tempest.lib.common.rest_client [req-04d54c56-d3f9-4783-95ea-07e9d6fcc26b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:36 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04d54c56-d3f9-4783-95ea-07e9d6fcc26b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.024 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:37.026 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:37.057 38 INFO tempest.lib.common.rest_client [req-0e6ba654-0e3c-49e1-ad81-ce35e94106a7 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-12-05 13:23:37.058 38 DEBUG tempest.lib.common.rest_client [req-0e6ba654-0e3c-49e1-ad81-ce35e94106a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e6ba654-0e3c-49e1-ad81-ce35e94106a7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.062 41 INFO tempest.lib.common.rest_client [req-b6222e40-f164-486d-a972-706189084b1b ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-12-05 13:23:37.063 41 DEBUG tempest.lib.common.rest_client [req-b6222e40-f164-486d-a972-706189084b1b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6222e40-f164-486d-a972-706189084b1b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.063 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:37.065 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:37.074 39 INFO tempest.lib.common.rest_client [req-3ee4716a-8f61-4bac-bcb9-c727c7a65827 ] Request (AgentsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.047s 2020-12-05 13:23:37.074 39 DEBUG tempest.lib.common.rest_client [req-3ee4716a-8f61-4bac-bcb9-c727c7a65827 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ee4716a-8f61-4bac-bcb9-c727c7a65827', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.107 38 INFO tempest.lib.common.rest_client [req-d2da5e08-93c5-4fc2-8ad9-dd7832069a0e ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-12-05 13:23:37.107 38 DEBUG tempest.lib.common.rest_client [req-d2da5e08-93c5-4fc2-8ad9-dd7832069a0e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2da5e08-93c5-4fc2-8ad9-dd7832069a0e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.108 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:37.109 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:37.118 41 INFO tempest.lib.common.rest_client [req-550eb68c-f7d2-470e-b36e-f164e43c2401 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.052s 2020-12-05 13:23:37.119 41 DEBUG tempest.lib.common.rest_client [req-550eb68c-f7d2-470e-b36e-f164e43c2401 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-550eb68c-f7d2-470e-b36e-f164e43c2401', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.128 39 INFO tempest.lib.common.rest_client [req-abe09fac-e3a0-4669-8bc9-c9c2b79a05b0 ] Request (AgentsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles/72a4576c553448cd941b052c1ca0cf2d 0.053s 2020-12-05 13:23:37.129 39 DEBUG tempest.lib.common.rest_client [req-abe09fac-e3a0-4669-8bc9-c9c2b79a05b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abe09fac-e3a0-4669-8bc9-c9c2b79a05b0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.155 40 INFO tempest.lib.common.rest_client [req-b3134c69-a1b3-40cd-b988-3d29631d5418 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-05 13:23:37.156 40 DEBUG tempest.lib.common.rest_client [req-b3134c69-a1b3-40cd-b988-3d29631d5418 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3134c69-a1b3-40cd-b988-3d29631d5418', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["TtG-sy0lThmRnogVfNLi4g"], "expires_at": "2020-12-05T14:23:37.000000Z", "issued_at": "2020-12-05T13:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.188 40 INFO tempest.lib.common.rest_client [req-bfc7fcaa-0ff7-4ee8-adbb-b3d3720a26e8 ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-12-05 13:23:37.189 40 DEBUG tempest.lib.common.rest_client [req-bfc7fcaa-0ff7-4ee8-adbb-b3d3720a26e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bfc7fcaa-0ff7-4ee8-adbb-b3d3720a26e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["n6F1w1jZSTCMYgar_MLReQ"], "expires_at": "2020-12-05T14:23:37.000000Z", "issued_at": "2020-12-05T13:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.204 38 INFO tempest.lib.common.rest_client [req-67a46036-fe84-496b-b7dd-335be13b4d16 ] Request (ImagesMetadataRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.094s 2020-12-05 13:23:37.204 38 DEBUG tempest.lib.common.rest_client [req-67a46036-fe84-496b-b7dd-335be13b4d16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-67a46036-fe84-496b-b7dd-335be13b4d16', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.223 39 INFO tempest.lib.common.rest_client [req-6a47c38a-1e9e-4d71-95a2-c68fae17c42a ] Request (AgentsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles/a629c95d64b3416fb80ae90af4f69c05 0.093s 2020-12-05 13:23:37.223 39 DEBUG tempest.lib.common.rest_client [req-6a47c38a-1e9e-4d71-95a2-c68fae17c42a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a47c38a-1e9e-4d71-95a2-c68fae17c42a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.237 41 INFO tempest.lib.common.rest_client [req-b7865c75-47be-4564-b3b6-ad2e35918bc9 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles/72a4576c553448cd941b052c1ca0cf2d 0.116s 2020-12-05 13:23:37.240 41 DEBUG tempest.lib.common.rest_client [req-b7865c75-47be-4564-b3b6-ad2e35918bc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7865c75-47be-4564-b3b6-ad2e35918bc9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.285 40 INFO tempest.lib.common.rest_client [req-4b186ce5-2d7d-4bfe-9c18-9f51694aa27c ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:37.286 40 DEBUG tempest.lib.common.rest_client [req-4b186ce5-2d7d-4bfe-9c18-9f51694aa27c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b186ce5-2d7d-4bfe-9c18-9f51694aa27c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["p77dstytSeelZTa7GfKMOw"], "expires_at": "2020-12-05T14:23:37.000000Z", "issued_at": "2020-12-05T13:23:37.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.313 38 INFO tempest.lib.common.rest_client [req-8738a26b-c282-4656-8aed-43d5a7088f14 ] Request (ImagesMetadataRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles/72a4576c553448cd941b052c1ca0cf2d 0.108s 2020-12-05 13:23:37.314 38 DEBUG tempest.lib.common.rest_client [req-8738a26b-c282-4656-8aed-43d5a7088f14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8738a26b-c282-4656-8aed-43d5a7088f14', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.393 40 INFO tempest.lib.common.rest_client [req-4577e822-8931-453b-bc14-429d025ef549 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.105s 2020-12-05 13:23:37.393 40 DEBUG tempest.lib.common.rest_client [req-4577e822-8931-453b-bc14-429d025ef549 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4577e822-8931-453b-bc14-429d025ef549', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.400 41 INFO tempest.lib.common.rest_client [req-07ca17c0-6c20-48cf-9b66-5fed58176145 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles/a629c95d64b3416fb80ae90af4f69c05 0.157s 2020-12-05 13:23:37.400 41 DEBUG tempest.lib.common.rest_client [req-07ca17c0-6c20-48cf-9b66-5fed58176145 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07ca17c0-6c20-48cf-9b66-5fed58176145', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.427 38 INFO tempest.lib.common.rest_client [req-c2b122fe-86c9-4f30-8c1f-71ba89535205 ] Request (ImagesMetadataRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-05 13:23:37.428 38 DEBUG tempest.lib.common.rest_client [req-c2b122fe-86c9-4f30-8c1f-71ba89535205 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2b122fe-86c9-4f30-8c1f-71ba89535205', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.490 40 INFO tempest.lib.common.rest_client [req-34328908-4dbb-4910-a99f-b62bf78260e3 ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.096s 2020-12-05 13:23:37.491 40 DEBUG tempest.lib.common.rest_client [req-34328908-4dbb-4910-a99f-b62bf78260e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34328908-4dbb-4910-a99f-b62bf78260e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.491 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:37.492 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:37.610 40 INFO tempest.lib.common.rest_client [req-5935d64a-7e2b-407d-9873-dcf7b55b698e ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.117s 2020-12-05 13:23:37.610 40 DEBUG tempest.lib.common.rest_client [req-5935d64a-7e2b-407d-9873-dcf7b55b698e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5935d64a-7e2b-407d-9873-dcf7b55b698e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.672 40 INFO tempest.lib.common.rest_client [req-4978bab2-b34f-44d2-9ff5-0f729ef13e78 ] Request (AggregatesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles/72a4576c553448cd941b052c1ca0cf2d 0.061s 2020-12-05 13:23:37.672 40 DEBUG tempest.lib.common.rest_client [req-4978bab2-b34f-44d2-9ff5-0f729ef13e78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4978bab2-b34f-44d2-9ff5-0f729ef13e78', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:37.777 40 INFO tempest.lib.common.rest_client [req-cfac128b-e0c6-4d96-9c09-4c05e168f3e9 ] Request (AggregatesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles/a629c95d64b3416fb80ae90af4f69c05 0.104s 2020-12-05 13:23:37.778 40 DEBUG tempest.lib.common.rest_client [req-cfac128b-e0c6-4d96-9c09-4c05e168f3e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:37 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfac128b-e0c6-4d96-9c09-4c05e168f3e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.308 39 INFO tempest.lib.common.rest_client [req-efe2c0e3-a070-45f5-a4f1-050dee552e7c ] Request (AgentsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:38.308 39 DEBUG tempest.lib.common.rest_client [req-efe2c0e3-a070-45f5-a4f1-050dee552e7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-efe2c0e3-a070-45f5-a4f1-050dee552e7c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["vmMl80dVSpKhv2aIWxEbLA"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.312 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:38.401 39 INFO tempest.lib.common.rest_client [req-429b21f4-4330-4593-af19-041b0e67bda9 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:38.401 39 DEBUG tempest.lib.common.rest_client [req-429b21f4-4330-4593-af19-041b0e67bda9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-429b21f4-4330-4593-af19-041b0e67bda9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["G0aQA2rIQiO0XhytCgVzdg"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.450 39 INFO tempest.lib.common.rest_client [req-2ea44832-5882-4728-b1b9-d32c58b32649 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:38.450 39 DEBUG tempest.lib.common.rest_client [req-2ea44832-5882-4728-b1b9-d32c58b32649 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ea44832-5882-4728-b1b9-d32c58b32649', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["eTk93Kx0TA-Q-VYAq8pouA"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.490 41 INFO tempest.lib.common.rest_client [req-8f02d598-9b68-4789-a221-6771c8df4b12 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:38.491 41 DEBUG tempest.lib.common.rest_client [req-8f02d598-9b68-4789-a221-6771c8df4b12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f02d598-9b68-4789-a221-6771c8df4b12', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["orB90LUGQwit-8e98IyxTA"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.498 39 INFO tempest.lib.common.rest_client [req-3561c7f5-f15e-4361-9dc3-3dadcf531102 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.046s 2020-12-05 13:23:38.499 39 DEBUG tempest.lib.common.rest_client [req-3561c7f5-f15e-4361-9dc3-3dadcf531102 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3561c7f5-f15e-4361-9dc3-3dadcf531102', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.519 38 INFO tempest.lib.common.rest_client [req-4fd9239e-b4a5-48b5-9008-bb91c42972d3 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:38.520 38 DEBUG tempest.lib.common.rest_client [req-4fd9239e-b4a5-48b5-9008-bb91c42972d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4fd9239e-b4a5-48b5-9008-bb91c42972d3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["rwswaqitRcaDo-GDpsO04A"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.538 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.539 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.540 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.541 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.542 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.543 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.544 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.545 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.546 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.557 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:create, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:38.558 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:38.603 39 INFO tempest.lib.common.rest_client [req-4b43b5c9-08b5-4575-bfe3-dee158010606 ] Request (AgentsRbacTest:test_create_agent): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.044s 2020-12-05 13:23:38.603 39 DEBUG tempest.lib.common.rest_client [req-4b43b5c9-08b5-4575-bfe3-dee158010606 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4b43b5c9-08b5-4575-bfe3-dee158010606', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.640 39 INFO tempest.lib.common.rest_client [req-0b59593e-b353-46a2-96bf-76759a94fb64 ] Request (AgentsRbacTest:test_create_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:38.640 39 DEBUG tempest.lib.common.rest_client [req-0b59593e-b353-46a2-96bf-76759a94fb64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b59593e-b353-46a2-96bf-76759a94fb64', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["T9hUX4ldTk6l-IKsDZLR0g"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.648 41 INFO tempest.lib.common.rest_client [req-5bf2eee1-dfa9-4c54-9cdd-1566aaa19d27 ] Request (FlavorExtraSpecsRbacTest:setUpClass): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.151s 2020-12-05 13:23:38.649 41 DEBUG tempest.lib.common.rest_client [req-5bf2eee1-dfa9-4c54-9cdd-1566aaa19d27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorExtraSpecsRbacTest-flavor-1514194187", "ram": 9, "vcpus": 9, "disk": 10, "id": "bfa035c1-e22a-4d9c-b511-0483fb2a9226"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '511', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5bf2eee1-dfa9-4c54-9cdd-1566aaa19d27', 'x-compute-request-id': 'req-5bf2eee1-dfa9-4c54-9cdd-1566aaa19d27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "bfa035c1-e22a-4d9c-b511-0483fb2a9226", "name": "tempest-FlavorExtraSpecsRbacTest-flavor-1514194187", "ram": 9, "disk": 10, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 9, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226"}]}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.660 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:38.680 38 INFO tempest.lib.common.rest_client [req-7e1fdc1f-e3a9-4c81-945e-579176a51ef1 ] Request (ImagesMetadataRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.156s 2020-12-05 13:23:38.681 38 DEBUG tempest.lib.common.rest_client [req-7e1fdc1f-e3a9-4c81-945e-579176a51ef1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesMetadataRbacTest-image-8686191"} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '648', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/de96ac53-094d-493d-8d81-62dc3598378e', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-7e1fdc1f-e3a9-4c81-945e-579176a51ef1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesMetadataRbacTest-image-8686191", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "929d836cca034597b6b7e7567529d2b2", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "de96ac53-094d-493d-8d81-62dc3598378e", "created_at": "2020-12-05T13:23:39Z", "updated_at": "2020-12-05T13:23:39Z", "tags": [], "self": "/v2/images/de96ac53-094d-493d-8d81-62dc3598378e", "file": "/v2/images/de96ac53-094d-493d-8d81-62dc3598378e/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.682 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:38.707 41 INFO tempest.lib.common.rest_client [req-73012040-4eb5-43d9-bb65-70f8193c14ba ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-05 13:23:38.707 41 DEBUG tempest.lib.common.rest_client [req-73012040-4eb5-43d9-bb65-70f8193c14ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73012040-4eb5-43d9-bb65-70f8193c14ba', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["AivSk6ZZSxiFWYmCiYaztw"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.714 38 INFO tempest.lib.common.rest_client [req-3d8d8f7a-0b80-4c5d-8033-d9fb580a12fd ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-12-05 13:23:38.715 38 DEBUG tempest.lib.common.rest_client [req-3d8d8f7a-0b80-4c5d-8033-d9fb580a12fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3d8d8f7a-0b80-4c5d-8033-d9fb580a12fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["jsmUyIR8QNOdf-TqodXLFA"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.737 39 INFO tempest.lib.common.rest_client [req-7e50c42d-7c9d-4031-946d-687d4d3c0e89 ] Request (AgentsRbacTest:test_create_agent): 200 POST http://172.30.13.94/compute/v2.1/os-agents 0.096s 2020-12-05 13:23:38.738 39 DEBUG tempest.lib.common.rest_client [req-7e50c42d-7c9d-4031-946d-687d4d3c0e89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"hypervisor": "kvm", "os": "win", "architecture": "x86", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '179', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7e50c42d-7c9d-4031-946d-687d4d3c0e89', 'x-compute-request-id': 'req-7e50c42d-7c9d-4031-946d-687d4d3c0e89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agent": {"hypervisor": "kvm", "os": "win", "architecture": "x86", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545", "agent_id": 619}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.743 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:38.757 41 INFO tempest.lib.common.rest_client [req-1e4bbc86-1ea5-408e-9d97-f29377b74031 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:38.758 41 DEBUG tempest.lib.common.rest_client [req-1e4bbc86-1ea5-408e-9d97-f29377b74031 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e4bbc86-1ea5-408e-9d97-f29377b74031', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["7gXSi-jQQQGCH21Rku99XQ"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.759 38 INFO tempest.lib.common.rest_client [req-005b8c8e-bcda-4ad2-a3e8-6b1bcf96cc05 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:38.760 38 DEBUG tempest.lib.common.rest_client [req-005b8c8e-bcda-4ad2-a3e8-6b1bcf96cc05 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-005b8c8e-bcda-4ad2-a3e8-6b1bcf96cc05', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["2CVGCbJ_QQSjyYqEaRUdkg"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.801 41 INFO tempest.lib.common.rest_client [req-cdc2b56e-b041-454b-8776-133ee08ec4ad ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.041s 2020-12-05 13:23:38.801 41 DEBUG tempest.lib.common.rest_client [req-cdc2b56e-b041-454b-8776-133ee08ec4ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdc2b56e-b041-454b-8776-133ee08ec4ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.803 38 INFO tempest.lib.common.rest_client [req-9fbec455-10b8-4ff9-b3b6-51e0a9e16108 ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.042s 2020-12-05 13:23:38.804 38 DEBUG tempest.lib.common.rest_client [req-9fbec455-10b8-4ff9-b3b6-51e0a9e16108 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9fbec455-10b8-4ff9-b3b6-51e0a9e16108', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.804 39 INFO tempest.lib.common.rest_client [req-0457527c-3900-45ca-a22f-b7d85ad2961c ] Request (AgentsRbacTest:test_create_agent): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.060s 2020-12-05 13:23:38.805 39 DEBUG tempest.lib.common.rest_client [req-0457527c-3900-45ca-a22f-b7d85ad2961c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0457527c-3900-45ca-a22f-b7d85ad2961c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.811 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.812 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:38.813 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:38.837 39 INFO tempest.lib.common.rest_client [req-a06e13d3-5864-4a06-a046-9cd8a05e7f98 ] Request (AgentsRbacTest:test_create_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:38.838 39 DEBUG tempest.lib.common.rest_client [req-a06e13d3-5864-4a06-a046-9cd8a05e7f98 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a06e13d3-5864-4a06-a046-9cd8a05e7f98', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["2eYbgV00TT6uBLPb5VnVmA"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.841 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.841 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.842 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.842 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.843 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.843 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.843 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.844 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.844 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.844 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.845 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.845 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.854 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.854 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.855 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.855 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.855 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.855 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.856 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.856 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.856 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.857 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.857 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.857 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.858 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.858 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.858 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.859 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.858 40 INFO tempest.lib.common.rest_client [req-25354964-754e-44db-8a15-de94c7fafd7e ] Request (AggregatesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:23:38.859 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.859 40 DEBUG tempest.lib.common.rest_client [req-25354964-754e-44db-8a15-de94c7fafd7e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25354964-754e-44db-8a15-de94c7fafd7e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["ZlhqhtvhSc2yIpqHKwDJJg"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.859 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.859 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.860 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.860 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.860 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.860 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.861 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.861 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.861 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.861 38 INFO tempest.lib.common.rest_client [req-ad0534c9-fc0d-49b4-b670-7dd48dd2d5b8 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.048s 2020-12-05 13:23:38.862 38 DEBUG tempest.lib.common.rest_client [req-ad0534c9-fc0d-49b4-b670-7dd48dd2d5b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad0534c9-fc0d-49b4-b670-7dd48dd2d5b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.862 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.862 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.863 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.864 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.864 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.865 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.865 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.866 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.866 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.867 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.867 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.867 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.867 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.868 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.868 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.868 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.869 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.869 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.869 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.870 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.870 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.870 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.871 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.871 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.871 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.872 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.872 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.872 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.872 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.873 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.873 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.873 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.874 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.874 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.874 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.874 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.875 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.876 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:38.897 38 INFO tempest.lib.common.rest_client [req-e99d19c6-be06-4278-9f1c-1ead2dbef45f ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:38.898 38 DEBUG tempest.lib.common.rest_client [req-e99d19c6-be06-4278-9f1c-1ead2dbef45f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e99d19c6-be06-4278-9f1c-1ead2dbef45f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["r5mb7zsSTQ-NReTMsMrFFA"], "expires_at": "2020-12-05T14:23:38.000000Z", "issued_at": "2020-12-05T13:23:38.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.930 39 INFO tempest.lib.common.rest_client [req-cb3ec731-2497-49a3-9193-1b29092b80bb ] Request (AgentsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-agents/619 0.091s 2020-12-05 13:23:38.931 39 DEBUG tempest.lib.common.rest_client [req-cb3ec731-2497-49a3-9193-1b29092b80bb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cb3ec731-2497-49a3-9193-1b29092b80bb', 'x-compute-request-id': 'req-cb3ec731-2497-49a3-9193-1b29092b80bb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/619'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.936 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:38.937 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.938 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.938 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.939 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.939 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.940 41 INFO tempest.lib.common.rest_client [req-404dfd26-12cc-42ca-ad0e-923d378f3371 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 POST http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs 0.063s 2020-12-05 13:23:38.940 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.940 41 DEBUG tempest.lib.common.rest_client [req-404dfd26-12cc-42ca-ad0e-923d378f3371 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1651131149": "tempest-FlavorExtraSpecsRbacTest-val-43958638"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-404dfd26-12cc-42ca-ad0e-923d378f3371', 'x-compute-request-id': 'req-404dfd26-12cc-42ca-ad0e-923d378f3371', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1651131149": "tempest-FlavorExtraSpecsRbacTest-val-43958638"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.941 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.941 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.942 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.942 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.942 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.943 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:38.943 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.943 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.944 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.944 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.945 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.945 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.945 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.945 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.946 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.946 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.946 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.947 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.947 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.947 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.947 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.948 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.948 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.948 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.949 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.949 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.949 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.949 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.950 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.951 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.952 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.953 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.954 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.955 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.956 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.957 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.958 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.959 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.960 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.961 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.962 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:38.963 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:delete, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:38.973 40 INFO tempest.lib.common.rest_client [req-0907bc01-a663-470a-926f-da14124eae7b ] Request (AggregatesRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/detail 0.111s 2020-12-05 13:23:38.973 40 DEBUG tempest.lib.common.rest_client [req-0907bc01-a663-470a-926f-da14124eae7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '3115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0907bc01-a663-470a-926f-da14124eae7b', 'x-compute-request-id': 'req-0907bc01-a663-470a-926f-da14124eae7b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/detail'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1536, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62776, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 64, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 2, "memory_mb_used": 1536, "local_gb_used": 2, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62776, "free_disk_gb": 98, "current_workload": 0, "running_vms": 1, "disk_available_least": 64, "host_ip": "172.30.13.93", "service": {"id": 3, "host": "lf-virtual8", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"f16c\\", \\"xsave\\", \\"pclmuldq\\", \\"rdtscp\\", \\"ds_cpl\\", \\"pdcm\\", \\"lm\\", \\"sse\\", \\"erms\\", \\"3dnowprefetch\\", \\"pdpe1gb\\", \\"adx\\", \\"apic\\", \\"ssse3\\", \\"bmi1\\", \\"stibp\\", \\"invpcid\\", \\"mmx\\", \\"avx2\\", \\"intel-pt\\", \\"pse36\\", \\"rdrand\\", \\"vmx\\", \\"pcid\\", \\"cx8\\", \\"est\\", \\"tsc-deadline\\", \\"cx16\\", \\"vme\\", \\"pni\\", \\"acpi\\", \\"pse\\", \\"x2apic\\", \\"dtes64\\", \\"de\\", \\"rtm\\", \\"smep\\", \\"mce\\", \\"ssbd\\", \\"xtpr\\", \\"monitor\\", \\"tsc\\", \\"xsaveopt\\", \\"movbe\\", \\"spec-ctrl\\", \\"osxsave\\", \\"ht\\", \\"tm\\", \\"arat\\", \\"abm\\", \\"smx\\", \\"fxsr\\", \\"pbe\\", \\"clflush\\", \\"ds\\", \\"md-clear\\", \\"ss\\", \\"sse4.1\\", \\"invtsc\\", \\"popcnt\\", \\"sse2\\", \\"sse4.2\\", \\"fpu\\", \\"fsgsbase\\", \\"smap\\", \\"pae\\", \\"aes\\", \\"avx\\", \\"tsc_adjust\\", \\"pge\\", \\"nx\\", \\"rdseed\\", \\"lahf_lm\\", \\"cmov\\", \\"fma\\", \\"msr\\", \\"tm2\\", \\"bmi2\\", \\"mtrr\\", \\"dca\\", \\"mca\\", \\"hle\\", \\"pat\\", \\"sep\\", \\"syscall\\"]}"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.984 39 INFO tempest.lib.common.rest_client [req-aa3292b3-d2ae-47e5-9ff1-c4922bff1f94 ] Request (AgentsRbacTest:test_delete_agent): 200 POST http://172.30.13.94/compute/v2.1/os-agents 0.021s 2020-12-05 13:23:38.984 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:38.984 39 DEBUG tempest.lib.common.rest_client [req-aa3292b3-d2ae-47e5-9ff1-c4922bff1f94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-1889136606", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '206', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aa3292b3-d2ae-47e5-9ff1-c4922bff1f94', 'x-compute-request-id': 'req-aa3292b3-d2ae-47e5-9ff1-c4922bff1f94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-1889136606", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545", "agent_id": 620}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:38.988 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:38.995 41 INFO tempest.lib.common.rest_client [req-20cdf1dc-a67b-454c-a7b0-8f89fa84c1ec ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.051s 2020-12-05 13:23:38.995 41 DEBUG tempest.lib.common.rest_client [req-20cdf1dc-a67b-454c-a7b0-8f89fa84c1ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20cdf1dc-a67b-454c-a7b0-8f89fa84c1ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.022 40 INFO tempest.lib.common.rest_client [req-ca3a33aa-3cf1-4dc2-8dbd-8417675c3927 ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:39.023 40 DEBUG tempest.lib.common.rest_client [req-ca3a33aa-3cf1-4dc2-8dbd-8417675c3927 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca3a33aa-3cf1-4dc2-8dbd-8417675c3927', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["8H65l-HWQqK3Y7v1EtCrdw"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.030 41 INFO tempest.lib.common.rest_client [req-128d8d34-96b0-4f31-8f45-f73146e7805e ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:39.031 41 DEBUG tempest.lib.common.rest_client [req-128d8d34-96b0-4f31-8f45-f73146e7805e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-128d8d34-96b0-4f31-8f45-f73146e7805e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["N_680bvkRCSf8gB8B2DSnA"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.040 39 INFO tempest.lib.common.rest_client [req-5fce9139-04d3-49ea-9313-edca7a56513c ] Request (AgentsRbacTest:test_delete_agent): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.052s 2020-12-05 13:23:39.041 39 DEBUG tempest.lib.common.rest_client [req-5fce9139-04d3-49ea-9313-edca7a56513c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5fce9139-04d3-49ea-9313-edca7a56513c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.073 40 INFO tempest.lib.common.rest_client [req-d548b313-128e-47d1-969b-eda9dade03cc ] Request (main): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:39.074 40 DEBUG tempest.lib.common.rest_client [req-d548b313-128e-47d1-969b-eda9dade03cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d548b313-128e-47d1-969b-eda9dade03cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["lz37yRDWTxOY5nv3xG_vwg"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.079 39 INFO tempest.lib.common.rest_client [req-896a4700-a266-43a4-b15e-265d5274ab1c ] Request (AgentsRbacTest:test_delete_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:39.079 39 DEBUG tempest.lib.common.rest_client [req-896a4700-a266-43a4-b15e-265d5274ab1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-896a4700-a266-43a4-b15e-265d5274ab1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["Kw5y7-QFS2-he3YWit-TJg"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.120 40 INFO tempest.lib.common.rest_client [req-3bce3ef2-a832-4207-b117-cb98de6bcccf ] Request (main): 200 GET http://172.30.13.94/identity/v3/services 0.044s 2020-12-05 13:23:39.121 40 DEBUG tempest.lib.common.rest_client [req-3bce3ef2-a832-4207-b117-cb98de6bcccf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '3880', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bce3ef2-a832-4207-b117-cb98de6bcccf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/services'} Body: b'{"services": [{"name": "heat", "description": "Heat Orchestration Service", "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/2dd99a84fcfe4d4c902af3c7e3370547"}}, {"name": "cinderv3", "description": "Cinder Volume Service V3", "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/4f0aec6b5f2347eeaf7987d5e52c15ee"}}, {"name": "heat-cfn", "description": "Heat CloudFormation Service", "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5635f75247b445dd8c099f6dae4391e9"}}, {"name": "neutron", "description": "Neutron Service", "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/5b112e1f9f554e9ea13076091373ba24"}}, {"name": "placement", "description": "Placement Service", "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/7e47b727207a4e4e806b20fab1e17997"}}, {"name": "nova_legacy", "description": "Nova Compute Service (Legacy 2.0)", "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/8f2830f7e6d24fe0b8bf0b4df9612609"}}, {"name": "swift", "description": "Swift Service", "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/943b628f9f61458d9ef457915c0a4842"}}, {"name": "keystone", "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a2db5aab3c1d485cbf6ccd92ea7a2995"}}, {"name": "aodh", "description": "OpenStack Alarming Service", "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/a372e5d5aaed47178d6bd28e25c4ed16"}}, {"name": "glance", "description": "Glance Image Service", "id": "b28a3fc2818546fd87c2e4c7f28b1ee2", "type": "image", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b28a3fc2818546fd87c2e4c7f28b1ee2"}}, {"name": "cinder", "description": "Cinder Volume Service", "id": "b29b4d43197d4c0b829c6cf8d8b39bf0", "type": "block-storage", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/b29b4d43197d4c0b829c6cf8d8b39bf0"}}, {"name": "cinderv2", "description": "Cinder Volume Service V2", "id": "db8f8625cffe4b818eb0c765296f5282", "type": "volumev2", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/db8f8625cffe4b818eb0c765296f5282"}}, {"name": "gnocchi", "description": "OpenStack Metric Service", "id": "de459e19dc284669a50e9c8274d0ec7f", "type": "metric", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/de459e19dc284669a50e9c8274d0ec7f"}}, {"name": "barbican", "description": "Barbican Service", "id": "ee548e94135646b6a64be1daf30191d1", "type": "key-manager", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/ee548e94135646b6a64be1daf30191d1"}}, {"name": "nova", "description": "Nova Compute Service", "id": "f4181cc470594a9e82e091cd6ff52ad7", "type": "compute", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f4181cc470594a9e82e091cd6ff52ad7"}}, {"name": "panko", "description": "OpenStack Telemetry Service", "id": "f9b2abba6c934357b57aaf5757557344", "type": "event", "enabled": true, "links": {"self": "http://172.30.13.94/identity/v3/services/f9b2abba6c934357b57aaf5757557344"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/services", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.138 41 INFO tempest.lib.common.rest_client [req-09d0705a-60bf-49cf-8a58-a892c63b42ec ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs 0.106s 2020-12-05 13:23:39.139 41 DEBUG tempest.lib.common.rest_client [req-09d0705a-60bf-49cf-8a58-a892c63b42ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-09d0705a-60bf-49cf-8a58-a892c63b42ec', 'x-compute-request-id': 'req-09d0705a-60bf-49cf-8a58-a892c63b42ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-1651131149": "tempest-FlavorExtraSpecsRbacTest-val-43958638"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.141 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.157 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.157 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.159 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.159 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.165 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.165 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.165 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.170 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.170 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.170 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.175 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.175 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.179 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.179 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.179 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.180 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.180 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.181 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:add_host, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:39.181 39 INFO tempest.lib.common.rest_client [req-0079a05a-f536-48f1-a96b-01a99f20e7c6 ] Request (AgentsRbacTest:test_delete_agent): 200 DELETE http://172.30.13.94/compute/v2.1/os-agents/620 0.100s 2020-12-05 13:23:39.182 39 DEBUG tempest.lib.common.rest_client [req-0079a05a-f536-48f1-a96b-01a99f20e7c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0079a05a-f536-48f1-a96b-01a99f20e7c6', 'x-compute-request-id': 'req-0079a05a-f536-48f1-a96b-01a99f20e7c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/620'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.182 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.196 41 INFO tempest.lib.common.rest_client [req-0e80f70f-b9f4-4288-bd43-ec7a7840eeff ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.055s 2020-12-05 13:23:39.197 41 DEBUG tempest.lib.common.rest_client [req-0e80f70f-b9f4-4288-bd43-ec7a7840eeff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e80f70f-b9f4-4288-bd43-ec7a7840eeff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.219 40 INFO tempest.lib.common.rest_client [req-7ce24316-0d31-420b-a807-c456602e82d9 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.038s 2020-12-05 13:23:39.220 40 DEBUG tempest.lib.common.rest_client [req-7ce24316-0d31-420b-a807-c456602e82d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-414164779"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7ce24316-0d31-420b-a807-c456602e82d9', 'x-compute-request-id': 'req-7ce24316-0d31-420b-a807-c456602e82d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3373, "name": "tempest-AggregatesRbacTest-aggregate-414164779", "created_at": "2020-12-05T13:23:39.207215", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.223 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.227 41 INFO tempest.lib.common.rest_client [req-8902ccdf-2a8c-4eca-8aef-4fddd78287d2 ] Request (FlavorExtraSpecsRbacTest:test_list_flavor_extra_specs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-12-05 13:23:39.228 41 DEBUG tempest.lib.common.rest_client [req-8902ccdf-2a8c-4eca-8aef-4fddd78287d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8902ccdf-2a8c-4eca-8aef-4fddd78287d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["WOBbK1FzSUmnONGmZB-5cg"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.237 39 INFO tempest.lib.common.rest_client [req-b7771afa-6b2c-4c44-a642-236da5e87409 ] Request (AgentsRbacTest:test_delete_agent): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.054s 2020-12-05 13:23:39.238 39 DEBUG tempest.lib.common.rest_client [req-b7771afa-6b2c-4c44-a642-236da5e87409 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7771afa-6b2c-4c44-a642-236da5e87409', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.272 40 INFO tempest.lib.common.rest_client [req-8bbb9736-7553-442d-bfcf-6ad46ec32bd5 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.047s 2020-12-05 13:23:39.272 40 DEBUG tempest.lib.common.rest_client [req-8bbb9736-7553-442d-bfcf-6ad46ec32bd5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bbb9736-7553-442d-bfcf-6ad46ec32bd5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.274 39 INFO tempest.lib.common.rest_client [req-603e9b8b-4d02-447a-a4e5-e143cd5d3dc8 ] Request (AgentsRbacTest:test_delete_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:39.274 39 DEBUG tempest.lib.common.rest_client [req-603e9b8b-4d02-447a-a4e5-e143cd5d3dc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-603e9b8b-4d02-447a-a4e5-e143cd5d3dc8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["_8WUvYZrS2mrvRRcT1UEQg"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.292 38 INFO tempest.lib.common.rest_client [req-6aee5a06-8ed0-4d8a-8536-26e133e85626 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 POST http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata 0.392s 2020-12-05 13:23:39.292 38 DEBUG tempest.lib.common.rest_client [req-6aee5a06-8ed0-4d8a-8536-26e133e85626 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:38 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6aee5a06-8ed0-4d8a-8536-26e133e85626', 'x-compute-request-id': 'req-6aee5a06-8ed0-4d8a-8536-26e133e85626', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.296 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.306 40 INFO tempest.lib.common.rest_client [req-ad7eb27a-a36f-40fd-862a-8fd30c751761 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:39.307 40 DEBUG tempest.lib.common.rest_client [req-ad7eb27a-a36f-40fd-862a-8fd30c751761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ad7eb27a-a36f-40fd-862a-8fd30c751761', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["e-DRDa77QYaLR-_2dypY7g"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.329 41 INFO tempest.lib.common.rest_client [req-821854d0-bbf1-4230-8524-61d61e7261c6 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1651131149 0.099s 2020-12-05 13:23:39.329 41 DEBUG tempest.lib.common.rest_client [req-821854d0-bbf1-4230-8524-61d61e7261c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-821854d0-bbf1-4230-8524-61d61e7261c6', 'x-compute-request-id': 'req-821854d0-bbf1-4230-8524-61d61e7261c6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-1651131149'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.335 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:39.336 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.337 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.337 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.337 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.338 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.338 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.339 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.339 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.339 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.341 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.341 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.341 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.343 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.343 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.343 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.345 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.345 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.345 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.345 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.346 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.346 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.346 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.346 38 INFO tempest.lib.common.rest_client [req-08a1d924-a86c-49c8-8155-1912ae596110 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.049s 2020-12-05 13:23:39.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.347 38 DEBUG tempest.lib.common.rest_client [req-08a1d924-a86c-49c8-8155-1912ae596110 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08a1d924-a86c-49c8-8155-1912ae596110', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.350 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.350 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.351 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.351 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.351 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.351 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.351 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.352 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.352 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.352 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.352 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.353 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.354 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.355 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.356 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.356 39 INFO tempest.lib.common.rest_client [req-e1bfc0d1-1f27-4093-9ea0-33289ba231df ] Request (AgentsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-agents/620 0.080s 2020-12-05 13:23:39.357 39 DEBUG tempest.lib.common.rest_client [req-e1bfc0d1-1f27-4093-9ea0-33289ba231df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '84', 'x-openstack-request-id': 'req-e1bfc0d1-1f27-4093-9ea0-33289ba231df', 'x-compute-request-id': 'req-e1bfc0d1-1f27-4093-9ea0-33289ba231df', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/620'} Body: b'{"itemNotFound": {"code": 404, "message": "No agent-build associated with id 620."}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.357 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.358 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.359 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.359 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.360 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.361 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.361 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:39.362 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.362 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.362 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.363 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.363 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.363 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.364 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.364 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.364 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.365 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.365 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.365 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.365 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.366 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.366 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.366 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.367 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.367 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.368 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.368 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:39.368 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.369 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.369 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.369 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.369 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.371 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.371 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.371 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.372 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.372 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.372 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.373 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.373 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.373 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.373 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.374 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.374 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.374 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.375 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.375 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.375 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.375 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.376 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.376 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.376 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.377 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.377 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.377 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.378 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.378 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.378 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.378 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.379 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.379 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.379 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.380 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.380 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.380 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.381 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.381 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.381 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.382 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.382 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.382 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.382 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.383 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.383 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.383 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.384 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.384 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.384 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.385 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.385 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.385 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.386 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.386 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.386 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.387 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.387 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.387 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.387 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.387 38 INFO tempest.lib.common.rest_client [req-52e266d1-9c6d-44f0-a3ed-46a4d7fc7ca6 ] Request (ImagesMetadataRbacTest:test_create_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:23:39.388 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.388 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.388 38 DEBUG tempest.lib.common.rest_client [req-52e266d1-9c6d-44f0-a3ed-46a4d7fc7ca6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52e266d1-9c6d-44f0-a3ed-46a4d7fc7ca6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["YoNnefReRHqPTsptUG20dw"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.389 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:39.390 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.418 41 INFO tempest.lib.common.rest_client [req-d690b844-98a3-4427-a20a-3b4bb423f4c4 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.048s 2020-12-05 13:23:39.418 41 DEBUG tempest.lib.common.rest_client [req-d690b844-98a3-4427-a20a-3b4bb423f4c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d690b844-98a3-4427-a20a-3b4bb423f4c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.441 39 INFO tempest.lib.common.rest_client [req-edbf59db-7ef5-4beb-931b-e088f05be8f5 ] Request (AgentsRbacTest:test_list_agents_rbac): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.051s 2020-12-05 13:23:39.442 39 DEBUG tempest.lib.common.rest_client [req-edbf59db-7ef5-4beb-931b-e088f05be8f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-edbf59db-7ef5-4beb-931b-e088f05be8f5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.451 41 INFO tempest.lib.common.rest_client [req-f023a363-72de-4dcf-9a35-1187f90ecf17 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:39.452 41 DEBUG tempest.lib.common.rest_client [req-f023a363-72de-4dcf-9a35-1187f90ecf17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f023a363-72de-4dcf-9a35-1187f90ecf17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["wxpaH-0iQ_y5skD5TzUq4A"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.477 39 INFO tempest.lib.common.rest_client [req-0d893715-f4f9-4f92-ba1d-ff5f50062a2e ] Request (AgentsRbacTest:test_list_agents_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:39.477 39 DEBUG tempest.lib.common.rest_client [req-0d893715-f4f9-4f92-ba1d-ff5f50062a2e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0d893715-f4f9-4f92-ba1d-ff5f50062a2e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["SU4JyXkNSzWuyqKamZBg1A"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.573 39 INFO tempest.lib.common.rest_client [req-a9863b3a-eb3e-4832-8744-4803b39e9640 ] Request (AgentsRbacTest:test_list_agents_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-agents 0.095s 2020-12-05 13:23:39.574 39 DEBUG tempest.lib.common.rest_client [req-a9863b3a-eb3e-4832-8744-4803b39e9640 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '14', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a9863b3a-eb3e-4832-8744-4803b39e9640', 'x-compute-request-id': 'req-a9863b3a-eb3e-4832-8744-4803b39e9640', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agents": []}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.576 41 INFO tempest.lib.common.rest_client [req-8baa57d8-e21d-4027-89cb-6ed876393e1a ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs 0.123s 2020-12-05 13:23:39.577 41 DEBUG tempest.lib.common.rest_client [req-8baa57d8-e21d-4027-89cb-6ed876393e1a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-227764434": "tempest-FlavorExtraSpecsRbacTest-val-135005549"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8baa57d8-e21d-4027-89cb-6ed876393e1a', 'x-compute-request-id': 'req-8baa57d8-e21d-4027-89cb-6ed876393e1a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-227764434": "tempest-FlavorExtraSpecsRbacTest-val-135005549"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.578 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.580 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.625 39 INFO tempest.lib.common.rest_client [req-d1c00fde-fb01-4fcf-b967-e871a5807bf5 ] Request (AgentsRbacTest:test_list_agents_rbac): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.046s 2020-12-05 13:23:39.626 39 DEBUG tempest.lib.common.rest_client [req-d1c00fde-fb01-4fcf-b967-e871a5807bf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d1c00fde-fb01-4fcf-b967-e871a5807bf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.630 41 INFO tempest.lib.common.rest_client [req-ef703a7f-7dbe-4853-a94e-6e6aa780fb87 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.050s 2020-12-05 13:23:39.631 41 DEBUG tempest.lib.common.rest_client [req-ef703a7f-7dbe-4853-a94e-6e6aa780fb87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef703a7f-7dbe-4853-a94e-6e6aa780fb87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.650 40 INFO tempest.lib.common.rest_client [req-c2ed1be9-dc3b-4765-9ed0-ba7eb0a27817 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/3373/action 0.342s 2020-12-05 13:23:39.651 40 DEBUG tempest.lib.common.rest_client [req-c2ed1be9-dc3b-4765-9ed0-ba7eb0a27817 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"add_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '256', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c2ed1be9-dc3b-4765-9ed0-ba7eb0a27817', 'x-compute-request-id': 'req-c2ed1be9-dc3b-4765-9ed0-ba7eb0a27817', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3373/action'} Body: b'{"aggregate": {"id": 3373, "name": "tempest-AggregatesRbacTest-aggregate-414164779", "hosts": ["lf-virtual9"], "metadata": {}, "created_at": "2020-12-05T13:23:39.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.656 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.659 39 INFO tempest.lib.common.rest_client [req-cdedebe3-fbb9-4bed-b33c-b95cc98199c5 ] Request (AgentsRbacTest:test_list_agents_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:39.660 39 DEBUG tempest.lib.common.rest_client [req-cdedebe3-fbb9-4bed-b33c-b95cc98199c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdedebe3-fbb9-4bed-b33c-b95cc98199c5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["7mroSLvDRe65E7R9Yyr7YQ"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.662 41 INFO tempest.lib.common.rest_client [req-c841b616-e689-4bd0-b8db-f99f8b696222 ] Request (FlavorExtraSpecsRbacTest:test_set_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-12-05 13:23:39.663 41 DEBUG tempest.lib.common.rest_client [req-c841b616-e689-4bd0-b8db-f99f8b696222 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c841b616-e689-4bd0-b8db-f99f8b696222', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["ZL65AUAiQ564j6UxlckULg"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.664 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:39.665 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.666 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.666 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.667 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.668 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.668 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.669 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.670 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.670 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.671 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.671 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.672 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.672 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.681 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.682 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.683 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.684 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.685 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.686 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.687 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.688 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.689 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.690 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.691 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.692 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-agents:update, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:39.708 40 INFO tempest.lib.common.rest_client [req-58dd46b1-44d5-45f9-b4c8-e9f1192717c5 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.050s 2020-12-05 13:23:39.709 40 DEBUG tempest.lib.common.rest_client [req-58dd46b1-44d5-45f9-b4c8-e9f1192717c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58dd46b1-44d5-45f9-b4c8-e9f1192717c5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.738 38 INFO tempest.lib.common.rest_client [req-28f42286-f019-49c9-89cb-c3cc74e1b72f ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.348s 2020-12-05 13:23:39.739 38 DEBUG tempest.lib.common.rest_client [req-28f42286-f019-49c9-89cb-c3cc74e1b72f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-28f42286-f019-49c9-89cb-c3cc74e1b72f', 'x-compute-request-id': 'req-28f42286-f019-49c9-89cb-c3cc74e1b72f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.741 40 INFO tempest.lib.common.rest_client [req-fa00b5ba-6155-4335-949a-129669397fe4 ] Request (AggregatesRbacTest:test_add_host_to_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:39.742 40 DEBUG tempest.lib.common.rest_client [req-fa00b5ba-6155-4335-949a-129669397fe4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa00b5ba-6155-4335-949a-129669397fe4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["YL8y0kMSRVy2MEBg43DLmw"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.742 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:39.743 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.745 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:39.772 39 INFO tempest.lib.common.rest_client [req-fc8d1fa7-cf45-4cb2-85b7-cb32224630ac ] Request (AgentsRbacTest:test_update_agent): 200 POST http://172.30.13.94/compute/v2.1/os-agents 0.080s 2020-12-05 13:23:39.773 39 DEBUG tempest.lib.common.rest_client [req-fc8d1fa7-cf45-4cb2-85b7-cb32224630ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-522865062", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '205', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fc8d1fa7-cf45-4cb2-85b7-cb32224630ac', 'x-compute-request-id': 'req-fc8d1fa7-cf45-4cb2-85b7-cb32224630ac', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents'} Body: b'{"agent": {"hypervisor": "common", "os": "linux", "architecture": "tempest-x86_64-522865062", "version": "7.0", "url": "xxx://xxxx/xxx/xxx", "md5hash": "add6bb58e139be103324d04d82d8f545", "agent_id": 621}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.773 41 INFO tempest.lib.common.rest_client [req-3f8cbb2e-07f9-46be-acf6-78269dc6bff1 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-227764434 0.109s 2020-12-05 13:23:39.774 41 DEBUG tempest.lib.common.rest_client [req-3f8cbb2e-07f9-46be-acf6-78269dc6bff1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3f8cbb2e-07f9-46be-acf6-78269dc6bff1', 'x-compute-request-id': 'req-3f8cbb2e-07f9-46be-acf6-78269dc6bff1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-227764434'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.775 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.778 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:39.779 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.779 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.780 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.781 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.781 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.782 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.782 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.782 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.783 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.783 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.783 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.784 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.784 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.784 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.785 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.785 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.785 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.786 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.786 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.786 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.787 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.787 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.787 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.788 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.788 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.788 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.788 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.789 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.789 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.789 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.790 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.790 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.790 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.790 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.791 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.791 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.791 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.792 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.792 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.792 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.792 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.793 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.793 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.793 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.794 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.794 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.794 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.795 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.795 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.795 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.796 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.796 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.796 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.796 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.797 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.797 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.797 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.798 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.798 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.798 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.799 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.799 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.799 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.800 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.800 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.800 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.801 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.801 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.801 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.801 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.802 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.802 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.802 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.803 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.803 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:39.804 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:39.822 39 INFO tempest.lib.common.rest_client [req-ceee430a-7eac-4d9d-8d3f-98a1f4803c30 ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.046s 2020-12-05 13:23:39.823 39 DEBUG tempest.lib.common.rest_client [req-ceee430a-7eac-4d9d-8d3f-98a1f4803c30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ceee430a-7eac-4d9d-8d3f-98a1f4803c30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.857 39 INFO tempest.lib.common.rest_client [req-1b7dd5db-9e4e-4317-805a-4b23e9be459d ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:39.858 39 DEBUG tempest.lib.common.rest_client [req-1b7dd5db-9e4e-4317-805a-4b23e9be459d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b7dd5db-9e4e-4317-805a-4b23e9be459d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["htTayPAqRceSd5laEBAQWA"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.867 41 INFO tempest.lib.common.rest_client [req-081a943c-6454-40bd-89c8-7d7a0ea866a1 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs 0.062s 2020-12-05 13:23:39.867 41 DEBUG tempest.lib.common.rest_client [req-081a943c-6454-40bd-89c8-7d7a0ea866a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-924117170": "tempest-FlavorExtraSpecsRbacTest-val-863958426"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '117', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-081a943c-6454-40bd-89c8-7d7a0ea866a1', 'x-compute-request-id': 'req-081a943c-6454-40bd-89c8-7d7a0ea866a1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-924117170": "tempest-FlavorExtraSpecsRbacTest-val-863958426"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.870 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.921 41 INFO tempest.lib.common.rest_client [req-22861262-6006-4bc6-a0c4-06cc372a48ce ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.050s 2020-12-05 13:23:39.922 41 DEBUG tempest.lib.common.rest_client [req-22861262-6006-4bc6-a0c4-06cc372a48ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22861262-6006-4bc6-a0c4-06cc372a48ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.941 39 INFO tempest.lib.common.rest_client [req-3b7207e7-4a26-4cb4-9bfe-2f20d4181752 ] Request (AgentsRbacTest:test_update_agent): 200 PUT http://172.30.13.94/compute/v2.1/os-agents/621 0.081s 2020-12-05 13:23:39.941 39 DEBUG tempest.lib.common.rest_client [req-3b7207e7-4a26-4cb4-9bfe-2f20d4181752 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"para": {"version": "8.0", "url": "xxx://xxxx/xxx/xxx2", "md5hash": "add6bb58e139be103324d04d82d8f547"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '125', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3b7207e7-4a26-4cb4-9bfe-2f20d4181752', 'x-compute-request-id': 'req-3b7207e7-4a26-4cb4-9bfe-2f20d4181752', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/621'} Body: b'{"agent": {"agent_id": "621", "version": "8.0", "url": "xxx://xxxx/xxx/xxx2", "md5hash": "add6bb58e139be103324d04d82d8f547"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.945 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:39.956 41 INFO tempest.lib.common.rest_client [req-31c208a2-d5c7-46c4-8cfa-43b42bbd9e61 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:39.957 41 DEBUG tempest.lib.common.rest_client [req-31c208a2-d5c7-46c4-8cfa-43b42bbd9e61 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31c208a2-d5c7-46c4-8cfa-43b42bbd9e61', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["5ejc4XNpR_6w8MNUMW2PXw"], "expires_at": "2020-12-05T14:23:39.000000Z", "issued_at": "2020-12-05T13:23:39.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:39.998 39 INFO tempest.lib.common.rest_client [req-ba8eac1b-0261-4ee8-8de9-717ea895a7d3 ] Request (AgentsRbacTest:test_update_agent): 200 GET http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles 0.052s 2020-12-05 13:23:39.998 39 DEBUG tempest.lib.common.rest_client [req-ba8eac1b-0261-4ee8-8de9-717ea895a7d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba8eac1b-0261-4ee8-8de9-717ea895a7d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb/users/c7513c4805334d7d994ea8f1b4d45d2b/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.029 39 INFO tempest.lib.common.rest_client [req-5985fb82-0917-4cfa-bd7a-17a2c00be114 ] Request (AgentsRbacTest:test_update_agent): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-12-05 13:23:40.030 39 DEBUG tempest.lib.common.rest_client [req-5985fb82-0917-4cfa-bd7a-17a2c00be114 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5985fb82-0917-4cfa-bd7a-17a2c00be114', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c7513c4805334d7d994ea8f1b4d45d2b", "name": "tempest-AgentsRbacTest-1968029398", "password_expires_at": null}, "audit_ids": ["S_ktjrgpT6a-ybOgCjlEGw"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "6f6f90ba585042b5a78c3b1a530c37cb", "name": "tempest-AgentsRbacTest-1968029398"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_6f6f90ba585042b5a78c3b1a530c37cb", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.045 41 INFO tempest.lib.common.rest_client [req-995aa062-a5f3-4d94-859f-c25a561d6e14 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-924117170 0.086s 2020-12-05 13:23:40.045 41 DEBUG tempest.lib.common.rest_client [req-995aa062-a5f3-4d94-859f-c25a561d6e14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '100', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-995aa062-a5f3-4d94-859f-c25a561d6e14', 'x-compute-request-id': 'req-995aa062-a5f3-4d94-859f-c25a561d6e14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-924117170'} Body: b'{"tempest-FlavorExtraSpecsRbacTest-key-924117170": "tempest-FlavorExtraSpecsRbacTest-val-863958426"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.046 38 INFO tempest.lib.common.rest_client [req-a304f884-6114-4e6d-9670-2ad397d53342 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata 0.300s 2020-12-05 13:23:40.047 38 DEBUG tempest.lib.common.rest_client [req-a304f884-6114-4e6d-9670-2ad397d53342 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a304f884-6114-4e6d-9670-2ad397d53342', 'x-compute-request-id': 'req-a304f884-6114-4e6d-9670-2ad397d53342', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.047 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.049 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.051 40 INFO tempest.lib.common.rest_client [req-ad813378-1917-441c-8068-7f2496b921f4 ] Request (AggregatesRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/3373/action 0.307s 2020-12-05 13:23:40.052 40 DEBUG tempest.lib.common.rest_client [req-ad813378-1917-441c-8068-7f2496b921f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:39 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '243', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ad813378-1917-441c-8068-7f2496b921f4', 'x-compute-request-id': 'req-ad813378-1917-441c-8068-7f2496b921f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3373/action'} Body: b'{"aggregate": {"id": 3373, "name": "tempest-AggregatesRbacTest-aggregate-414164779", "hosts": [], "metadata": {}, "created_at": "2020-12-05T13:23:39.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.093 41 INFO tempest.lib.common.rest_client [req-1769c71c-8829-4250-bf52-0d95fffb12c2 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.045s 2020-12-05 13:23:40.094 41 DEBUG tempest.lib.common.rest_client [req-1769c71c-8829-4250-bf52-0d95fffb12c2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1769c71c-8829-4250-bf52-0d95fffb12c2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.097 38 INFO tempest.lib.common.rest_client [req-66b82542-6840-46d3-be36-0c9fe98f97f0 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.046s 2020-12-05 13:23:40.097 38 DEBUG tempest.lib.common.rest_client [req-66b82542-6840-46d3-be36-0c9fe98f97f0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66b82542-6840-46d3-be36-0c9fe98f97f0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.106 40 INFO tempest.lib.common.rest_client [req-92f01edb-bc32-4951-bc86-c41a2fd48278 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3373 0.050s 2020-12-05 13:23:40.106 40 DEBUG tempest.lib.common.rest_client [req-92f01edb-bc32-4951-bc86-c41a2fd48278 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-92f01edb-bc32-4951-bc86-c41a2fd48278', 'x-compute-request-id': 'req-92f01edb-bc32-4951-bc86-c41a2fd48278', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3373'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.113 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:40.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.117 39 INFO tempest.lib.common.rest_client [req-1ac0a954-37e6-459c-8c48-ff1e9c26667d ] Request (AgentsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-agents/621 0.085s 2020-12-05 13:23:40.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.117 39 DEBUG tempest.lib.common.rest_client [req-1ac0a954-37e6-459c-8c48-ff1e9c26667d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ac0a954-37e6-459c-8c48-ff1e9c26667d', 'x-compute-request-id': 'req-1ac0a954-37e6-459c-8c48-ff1e9c26667d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-agents/621'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.123 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.123 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.124 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.124 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.125 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.125 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.127 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.127 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.127 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.129 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.129 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.129 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.130 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.130 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.130 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.131 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.131 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.131 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.132 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.132 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.132 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.132 38 INFO tempest.lib.common.rest_client [req-799c0246-9fc9-4321-adc8-368c5c81db48 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:40.132 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.133 38 DEBUG tempest.lib.common.rest_client [req-799c0246-9fc9-4321-adc8-368c5c81db48 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-799c0246-9fc9-4321-adc8-368c5c81db48', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["2JkUudeSRoaC4RY9Uvrs0w"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.133 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.133 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.133 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.134 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.134 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.134 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.134 41 INFO tempest.lib.common.rest_client [req-f3535861-e15d-49c7-a096-859ef271a395 ] Request (FlavorExtraSpecsRbacTest:test_show_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-05 13:23:40.134 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.135 41 DEBUG tempest.lib.common.rest_client [req-f3535861-e15d-49c7-a096-859ef271a395 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3535861-e15d-49c7-a096-859ef271a395', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["ZTnj-lVZQhiiZkrvSjUK9Q"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.135 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.135 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.135 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.136 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.136 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.136 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.136 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.137 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.137 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.137 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.137 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.138 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.138 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.138 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.138 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.139 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:create, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:40.139 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.189 40 INFO tempest.lib.common.rest_client [req-4908e81f-5659-4208-9aac-a307f79b7639 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.049s 2020-12-05 13:23:40.190 40 DEBUG tempest.lib.common.rest_client [req-4908e81f-5659-4208-9aac-a307f79b7639 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4908e81f-5659-4208-9aac-a307f79b7639', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.225 40 INFO tempest.lib.common.rest_client [req-29ca8aa2-b54f-4601-ac93-c0bb8dafc314 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:40.225 40 DEBUG tempest.lib.common.rest_client [req-29ca8aa2-b54f-4601-ac93-c0bb8dafc314 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29ca8aa2-b54f-4601-ac93-c0bb8dafc314', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["WNJW0_uiSLqwWeurY0jwrw"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.234 41 INFO tempest.lib.common.rest_client [req-a082c105-eeb5-41c3-a42d-5d912ab2876a ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-924117170 0.098s 2020-12-05 13:23:40.235 41 DEBUG tempest.lib.common.rest_client [req-a082c105-eeb5-41c3-a42d-5d912ab2876a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a082c105-eeb5-41c3-a42d-5d912ab2876a', 'x-compute-request-id': 'req-a082c105-eeb5-41c3-a42d-5d912ab2876a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-924117170'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.239 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:40.239 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.240 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.240 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.241 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.241 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.241 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.242 39 INFO tempest.lib.common.rest_client [req-ef5b5933-5816-4e45-ba9a-7e3046e2378b ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c7513c4805334d7d994ea8f1b4d45d2b 0.118s 2020-12-05 13:23:40.242 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.242 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.242 39 DEBUG tempest.lib.common.rest_client [req-ef5b5933-5816-4e45-ba9a-7e3046e2378b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef5b5933-5816-4e45-ba9a-7e3046e2378b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c7513c4805334d7d994ea8f1b4d45d2b'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.243 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.243 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.243 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.243 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.244 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.244 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.244 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.245 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.245 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.245 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.246 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.246 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.246 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.247 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.247 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.247 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.248 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.248 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.248 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.248 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.249 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.249 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.249 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.250 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.250 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.250 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.251 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.251 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.251 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.251 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.252 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.252 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.252 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.253 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.253 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.253 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.254 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.254 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.254 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.255 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.255 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.255 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.255 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.256 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.256 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.256 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.257 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.257 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.257 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.258 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.258 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.258 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.259 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.259 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.259 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.260 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.260 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.260 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.261 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.261 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.261 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.262 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.262 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.262 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.262 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.263 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.263 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.264 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:40.308 41 INFO tempest.lib.common.rest_client [req-6ef04164-f442-4b8c-ae98-a2995ff97f37 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs 0.043s 2020-12-05 13:23:40.309 41 DEBUG tempest.lib.common.rest_client [req-6ef04164-f442-4b8c-ae98-a2995ff97f37 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-663778317": "tempest-FlavorExtraSpecsRbacTest-val-2044065955"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6ef04164-f442-4b8c-ae98-a2995ff97f37', 'x-compute-request-id': 'req-6ef04164-f442-4b8c-ae98-a2995ff97f37', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-663778317": "tempest-FlavorExtraSpecsRbacTest-val-2044065955"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.311 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.327 39 INFO tempest.lib.common.rest_client [req-57e1fa8b-d35b-4247-8fcc-cbfa9ba0d6e3 ] Request (AgentsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-05 13:23:40.328 39 DEBUG tempest.lib.common.rest_client [req-57e1fa8b-d35b-4247-8fcc-cbfa9ba0d6e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57e1fa8b-d35b-4247-8fcc-cbfa9ba0d6e3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["m-gFUHWRTBqABdPcppQqXQ"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.361 41 INFO tempest.lib.common.rest_client [req-26abac17-658e-4c32-9e48-a0c8204731fb ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.048s 2020-12-05 13:23:40.361 41 DEBUG tempest.lib.common.rest_client [req-26abac17-658e-4c32-9e48-a0c8204731fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-26abac17-658e-4c32-9e48-a0c8204731fb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.428 40 INFO tempest.lib.common.rest_client [req-be6f8c20-2e38-428d-8b36-a0613b4ebccd ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.201s 2020-12-05 13:23:40.429 40 DEBUG tempest.lib.common.rest_client [req-be6f8c20-2e38-428d-8b36-a0613b4ebccd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1655197913"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be6f8c20-2e38-428d-8b36-a0613b4ebccd', 'x-compute-request-id': 'req-be6f8c20-2e38-428d-8b36-a0613b4ebccd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3374, "name": "tempest-AggregatesRbacTest-aggregate-1655197913", "created_at": "2020-12-05T13:23:40.416035", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.434 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.444 41 INFO tempest.lib.common.rest_client [req-021a7342-acc1-4123-9af8-0d92e1435aa6 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-12-05 13:23:40.444 41 DEBUG tempest.lib.common.rest_client [req-021a7342-acc1-4123-9af8-0d92e1435aa6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-021a7342-acc1-4123-9af8-0d92e1435aa6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["EDKHnmNORgOVjoy4UBmAag"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.493 38 INFO tempest.lib.common.rest_client [req-be803db7-8f51-488f-b2ea-6e821f9c36ea ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 204 DELETE http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.358s 2020-12-05 13:23:40.493 38 DEBUG tempest.lib.common.rest_client [req-be803db7-8f51-488f-b2ea-6e821f9c36ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-be803db7-8f51-488f-b2ea-6e821f9c36ea', 'x-compute-request-id': 'req-be803db7-8f51-488f-b2ea-6e821f9c36ea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.494 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.496 40 INFO tempest.lib.common.rest_client [req-263af049-b770-4dd0-a6c5-62c7d5daf1b6 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.061s 2020-12-05 13:23:40.497 40 DEBUG tempest.lib.common.rest_client [req-263af049-b770-4dd0-a6c5-62c7d5daf1b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-263af049-b770-4dd0-a6c5-62c7d5daf1b6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.530 40 INFO tempest.lib.common.rest_client [req-4e30a428-bb58-4c87-9927-fc6ecf292cd0 ] Request (AggregatesRbacTest:test_create_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:40.530 40 DEBUG tempest.lib.common.rest_client [req-4e30a428-bb58-4c87-9927-fc6ecf292cd0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4e30a428-bb58-4c87-9927-fc6ecf292cd0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["7sbPvKbYTQOK02f3ugnoow"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.544 38 INFO tempest.lib.common.rest_client [req-59de6d3c-07ca-4b0a-ab72-9d831eb9c124 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.049s 2020-12-05 13:23:40.545 38 DEBUG tempest.lib.common.rest_client [req-59de6d3c-07ca-4b0a-ab72-9d831eb9c124 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59de6d3c-07ca-4b0a-ab72-9d831eb9c124', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.559 41 INFO tempest.lib.common.rest_client [req-ad21f0f5-1aff-4ec8-af00-ae9496ebcad2 ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-663778317 0.114s 2020-12-05 13:23:40.560 41 DEBUG tempest.lib.common.rest_client [req-ad21f0f5-1aff-4ec8-af00-ae9496ebcad2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ad21f0f5-1aff-4ec8-af00-ae9496ebcad2', 'x-compute-request-id': 'req-ad21f0f5-1aff-4ec8-af00-ae9496ebcad2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-663778317'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.560 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.588 39 INFO tempest.lib.common.rest_client [req-f41323be-542f-49b7-85bc-186657f471c3 ] Request (AgentsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6f6f90ba585042b5a78c3b1a530c37cb&name=default 0.259s 2020-12-05 13:23:40.589 39 DEBUG tempest.lib.common.rest_client [req-f41323be-542f-49b7-85bc-186657f471c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f41323be-542f-49b7-85bc-186657f471c3', 'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=6f6f90ba585042b5a78c3b1a530c37cb&name=default'} Body: b'{"security_groups": [{"id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "name": "default", "stateful": true, "tenant_id": "6f6f90ba585042b5a78c3b1a530c37cb", "description": "Default security group", "security_group_rules": [{"id": "59369c40-2612-4a9c-88e1-95896a112da7", "tenant_id": "6f6f90ba585042b5a78c3b1a530c37cb", "security_group_id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:40Z", "updated_at": "2020-12-05T13:23:40Z", "revision_number": 0, "project_id": "6f6f90ba585042b5a78c3b1a530c37cb"}, {"id": "8903548f-7a2b-4a28-a629-bebb6fa2e06b", "tenant_id": "6f6f90ba585042b5a78c3b1a530c37cb", "security_group_id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:40Z", "updated_at": "2020-12-05T13:23:40Z", "revision_number": 0, "project_id": "6f6f90ba585042b5a78c3b1a530c37cb"}, {"id": "adf6c835-71ec-4937-9eb4-0c13d692924e", "tenant_id": "6f6f90ba585042b5a78c3b1a530c37cb", "security_group_id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "description": null, "tags": [], "created_at": "2020-12-05T13:23:40Z", "updated_at": "2020-12-05T13:23:40Z", "revision_number": 0, "project_id": "6f6f90ba585042b5a78c3b1a530c37cb"}, {"id": "f9bcd5be-c946-4511-a994-b775ee984996", "tenant_id": "6f6f90ba585042b5a78c3b1a530c37cb", "security_group_id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "480fc797-f3f6-4430-97b8-eaca9eb5e7c0", "description": null, "tags": [], "created_at": "2020-12-05T13:23:40Z", "updated_at": "2020-12-05T13:23:40Z", "revision_number": 0, "project_id": "6f6f90ba585042b5a78c3b1a530c37cb"}], "tags": [], "created_at": "2020-12-05T13:23:40Z", "updated_at": "2020-12-05T13:23:40Z", "revision_number": 1, "project_id": "6f6f90ba585042b5a78c3b1a530c37cb"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.609 41 INFO tempest.lib.common.rest_client [req-960232d0-c11c-459a-974a-c1d4984a218e ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.047s 2020-12-05 13:23:40.609 41 DEBUG tempest.lib.common.rest_client [req-960232d0-c11c-459a-974a-c1d4984a218e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-960232d0-c11c-459a-974a-c1d4984a218e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.628 38 INFO tempest.lib.common.rest_client [req-97095f6a-2806-4389-9077-e5ec4083f076 ] Request (ImagesMetadataRbacTest:test_delete_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:40.629 38 DEBUG tempest.lib.common.rest_client [req-97095f6a-2806-4389-9077-e5ec4083f076 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97095f6a-2806-4389-9077-e5ec4083f076', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["TGER7bTQSTqr565Hh0b9pw"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.647 41 INFO tempest.lib.common.rest_client [req-c3a8bd39-8dfe-497b-b1f5-ed42bffed60f ] Request (FlavorExtraSpecsRbacTest:test_unset_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:40.647 41 DEBUG tempest.lib.common.rest_client [req-c3a8bd39-8dfe-497b-b1f5-ed42bffed60f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3a8bd39-8dfe-497b-b1f5-ed42bffed60f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["cdFDN1XJQbiLzu4y-YtnPg"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.653 40 INFO tempest.lib.common.rest_client [req-ea89486e-6719-4ed0-8d36-19904427d80a ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3374 0.121s 2020-12-05 13:23:40.654 40 DEBUG tempest.lib.common.rest_client [req-ea89486e-6719-4ed0-8d36-19904427d80a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ea89486e-6719-4ed0-8d36-19904427d80a', 'x-compute-request-id': 'req-ea89486e-6719-4ed0-8d36-19904427d80a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3374'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.658 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:40.659 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.660 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.661 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.661 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.662 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.663 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.663 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.664 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.664 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.665 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.665 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.666 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.667 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.667 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.667 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.668 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.668 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.668 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.669 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.670 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.670 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.670 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.671 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.672 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.673 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.673 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.673 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.674 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.675 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.675 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.675 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.676 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.676 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.676 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.677 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.678 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.678 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.678 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.679 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.680 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.680 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.681 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.681 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.681 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.682 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.683 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.684 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.684 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.685 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:delete, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:40.719 40 INFO tempest.lib.common.rest_client [req-55ac617e-e2d1-4a42-af0d-db325d5ab044 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.034s 2020-12-05 13:23:40.720 40 DEBUG tempest.lib.common.rest_client [req-55ac617e-e2d1-4a42-af0d-db325d5ab044 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-97609928"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '213', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55ac617e-e2d1-4a42-af0d-db325d5ab044', 'x-compute-request-id': 'req-55ac617e-e2d1-4a42-af0d-db325d5ab044', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3375, "name": "tempest-AggregatesRbacTest-aggregate-97609928", "created_at": "2020-12-05T13:23:40.707818", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.725 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.742 41 INFO tempest.lib.common.rest_client [req-befd7b16-4f9e-4ffa-a6c0-2a17aaeec12c ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-663778317 0.093s 2020-12-05 13:23:40.743 41 DEBUG tempest.lib.common.rest_client [req-befd7b16-4f9e-4ffa-a6c0-2a17aaeec12c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '165', 'x-openstack-request-id': 'req-befd7b16-4f9e-4ffa-a6c0-2a17aaeec12c', 'x-compute-request-id': 'req-befd7b16-4f9e-4ffa-a6c0-2a17aaeec12c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-663778317'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor bfa035c1-e22a-4d9c-b511-0483fb2a9226 has no extra specs with key tempest-FlavorExtraSpecsRbacTest-key-663778317."}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.746 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:40.747 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.748 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.749 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.749 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.750 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.751 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.752 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.752 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.753 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.753 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.754 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.754 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.754 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.755 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.755 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.755 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.756 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.756 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.756 39 INFO tempest.lib.common.rest_client [req-52965386-2f24-41e5-9173-9604a7f2b510 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/480fc797-f3f6-4430-97b8-eaca9eb5e7c0 0.166s 2020-12-05 13:23:40.757 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.757 39 DEBUG tempest.lib.common.rest_client [req-52965386-2f24-41e5-9173-9604a7f2b510 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-52965386-2f24-41e5-9173-9604a7f2b510', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/480fc797-f3f6-4430-97b8-eaca9eb5e7c0'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.757 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.758 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.758 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.758 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.759 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.759 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.760 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.760 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.760 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.761 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.761 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.762 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.762 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.763 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.763 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.764 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.764 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.764 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.765 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.765 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.766 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.766 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.766 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.767 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.767 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.768 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.768 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.768 38 INFO tempest.lib.common.rest_client [req-f25c2c47-7166-49d7-99a0-96bbfb12bc5b ] Request (ImagesMetadataRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.138s 2020-12-05 13:23:40.768 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.769 38 DEBUG tempest.lib.common.rest_client [req-f25c2c47-7166-49d7-99a0-96bbfb12bc5b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '66', 'x-openstack-request-id': 'req-f25c2c47-7166-49d7-99a0-96bbfb12bc5b', 'x-compute-request-id': 'req-f25c2c47-7166-49d7-99a0-96bbfb12bc5b', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'{"itemNotFound": {"code": 404, "message": "Invalid metadata key"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.769 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.769 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.770 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.770 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.771 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.771 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.771 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.772 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.772 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:40.772 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.773 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.773 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.773 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.773 40 INFO tempest.lib.common.rest_client [req-b8b1d4b8-f0ed-4797-b1fc-27183a6319fa ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.047s 2020-12-05 13:23:40.773 40 DEBUG tempest.lib.common.rest_client [req-b8b1d4b8-f0ed-4797-b1fc-27183a6319fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8b1d4b8-f0ed-4797-b1fc-27183a6319fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.774 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.774 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.774 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:40.775 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.775 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.775 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.776 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.776 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.777 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.777 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.777 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.778 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.778 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.779 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.779 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.780 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.780 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.780 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.781 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:40.782 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-extra-specs:update, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:40.813 40 INFO tempest.lib.common.rest_client [req-c4eda3ca-2349-4875-946f-d1ae252d3177 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-05 13:23:40.814 40 DEBUG tempest.lib.common.rest_client [req-c4eda3ca-2349-4875-946f-d1ae252d3177 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4eda3ca-2349-4875-946f-d1ae252d3177', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["J8hw17YURnK6o_2jPNswww"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.830 41 INFO tempest.lib.common.rest_client [req-4a6fd00d-5a15-4d98-8241-a5d0a700db40 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 POST http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs 0.047s 2020-12-05 13:23:40.830 41 DEBUG tempest.lib.common.rest_client [req-4a6fd00d-5a15-4d98-8241-a5d0a700db40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-615151508": "tempest-FlavorExtraSpecsRbacTest-val-1886882588"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '118', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4a6fd00d-5a15-4d98-8241-a5d0a700db40', 'x-compute-request-id': 'req-4a6fd00d-5a15-4d98-8241-a5d0a700db40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs'} Body: b'{"extra_specs": {"tempest-FlavorExtraSpecsRbacTest-key-615151508": "tempest-FlavorExtraSpecsRbacTest-val-1886882588"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.833 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.835 38 INFO tempest.lib.common.rest_client [req-8568dbb4-70a4-4002-a43b-246dab178213 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.059s 2020-12-05 13:23:40.836 38 DEBUG tempest.lib.common.rest_client [req-8568dbb4-70a4-4002-a43b-246dab178213 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8568dbb4-70a4-4002-a43b-246dab178213', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.905 39 INFO tempest.lib.common.rest_client [req-210ea041-d30c-4a15-a3ec-86542ff91492 ] Request (AgentsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb 0.147s 2020-12-05 13:23:40.905 39 DEBUG tempest.lib.common.rest_client [req-210ea041-d30c-4a15-a3ec-86542ff91492 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-210ea041-d30c-4a15-a3ec-86542ff91492', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6f6f90ba585042b5a78c3b1a530c37cb'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.912 40 INFO tempest.lib.common.rest_client [req-a2754d89-a9cd-41fc-bc97-ffb0796bfea8 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3375 0.096s 2020-12-05 13:23:40.912 40 DEBUG tempest.lib.common.rest_client [req-a2754d89-a9cd-41fc-bc97-ffb0796bfea8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2754d89-a9cd-41fc-bc97-ffb0796bfea8', 'x-compute-request-id': 'req-a2754d89-a9cd-41fc-bc97-ffb0796bfea8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3375'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.913 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:40.927 38 INFO tempest.lib.common.rest_client [req-916b14df-a16f-44a3-8426-8e90156597b7 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:40.928 38 DEBUG tempest.lib.common.rest_client [req-916b14df-a16f-44a3-8426-8e90156597b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-916b14df-a16f-44a3-8426-8e90156597b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["aSFDXw8LRpWdwzpyV5OHSQ"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.942 41 INFO tempest.lib.common.rest_client [req-af705689-be34-41fd-a415-e48655b39dd4 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.107s 2020-12-05 13:23:40.942 41 DEBUG tempest.lib.common.rest_client [req-af705689-be34-41fd-a415-e48655b39dd4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af705689-be34-41fd-a415-e48655b39dd4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.944 39 INFO tempest.lib.common.rest_client [req-1e65ea67-ab68-423a-abb1-804cbb813558 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:23:40.945 39 DEBUG tempest.lib.common.rest_client [req-1e65ea67-ab68-423a-abb1-804cbb813558 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1e65ea67-ab68-423a-abb1-804cbb813558', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["7LGtR9dNT4mPCFKioBDsgQ"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.970 40 INFO tempest.lib.common.rest_client [req-27eec5e2-fc3f-4a12-ab97-4a37ade025ba ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.056s 2020-12-05 13:23:40.971 40 DEBUG tempest.lib.common.rest_client [req-27eec5e2-fc3f-4a12-ab97-4a37ade025ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27eec5e2-fc3f-4a12-ab97-4a37ade025ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:40.988 39 INFO tempest.lib.common.rest_client [req-ef172587-6bec-4c2a-98c7-ce1054715173 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:40.989 39 DEBUG tempest.lib.common.rest_client [req-ef172587-6bec-4c2a-98c7-ce1054715173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef172587-6bec-4c2a-98c7-ce1054715173', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["YAZo2vLCTEK150ksSm6k9w"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.023 41 INFO tempest.lib.common.rest_client [req-136743ba-02d4-457f-8a81-5df7bed45975 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:41.024 41 DEBUG tempest.lib.common.rest_client [req-136743ba-02d4-457f-8a81-5df7bed45975 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-136743ba-02d4-457f-8a81-5df7bed45975', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["VRoV9KADQAiE31342kEtXw"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.043 39 INFO tempest.lib.common.rest_client [req-ac533a0f-6d1f-4f67-acb1-4a81bd4a5a41 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-12-05 13:23:41.044 39 DEBUG tempest.lib.common.rest_client [req-ac533a0f-6d1f-4f67-acb1-4a81bd4a5a41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac533a0f-6d1f-4f67-acb1-4a81bd4a5a41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.049 40 INFO tempest.lib.common.rest_client [req-3ca10bdf-b290-432f-ac76-16524fa9d905 ] Request (AggregatesRbacTest:test_delete_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:23:41.050 40 DEBUG tempest.lib.common.rest_client [req-3ca10bdf-b290-432f-ac76-16524fa9d905 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ca10bdf-b290-432f-ac76-16524fa9d905', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["VxZCkqdeR8SwgjIQzoNrSQ"], "expires_at": "2020-12-05T14:23:40.000000Z", "issued_at": "2020-12-05T13:23:40.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.093 38 INFO tempest.lib.common.rest_client [req-c3085d04-4183-46e6-b5d3-a2ecd6c0dbe0 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata 0.164s 2020-12-05 13:23:41.093 38 DEBUG tempest.lib.common.rest_client [req-c3085d04-4183-46e6-b5d3-a2ecd6c0dbe0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:40 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c3085d04-4183-46e6-b5d3-a2ecd6c0dbe0', 'x-compute-request-id': 'req-c3085d04-4183-46e6-b5d3-a2ecd6c0dbe0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata'} Body: b'{"metadata": {}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.096 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:41.115 39 INFO tempest.lib.common.rest_client [req-836e55af-c2bb-410e-a38b-71a115769108 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.070s 2020-12-05 13:23:41.116 39 DEBUG tempest.lib.common.rest_client [req-836e55af-c2bb-410e-a38b-71a115769108 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-NovaAvailabilityZoneRbacTest-1257149122-desc", "domain_id": "default", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-836e55af-c2bb-410e-a38b-71a115769108', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "domain_id": "default", "description": "tempest-NovaAvailabilityZoneRbacTest-1257149122-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.139 41 INFO tempest.lib.common.rest_client [req-c6385a47-ad3c-456f-b02f-c42f90d8da2f ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 PUT http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-615151508 0.113s 2020-12-05 13:23:41.139 41 DEBUG tempest.lib.common.rest_client [req-c6385a47-ad3c-456f-b02f-c42f90d8da2f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"tempest-FlavorExtraSpecsRbacTest-key-615151508": "tempest-FlavorExtraSpecsRbacTest-val-779799332"} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '100', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c6385a47-ad3c-456f-b02f-c42f90d8da2f', 'x-compute-request-id': 'req-c6385a47-ad3c-456f-b02f-c42f90d8da2f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-615151508'} Body: b'{"tempest-FlavorExtraSpecsRbacTest-key-615151508": "tempest-FlavorExtraSpecsRbacTest-val-779799332"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.141 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:41.156 40 INFO tempest.lib.common.rest_client [req-cebddf8f-1a99-4d38-a2d3-895b16b4e557 ] Request (AggregatesRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3375 0.104s 2020-12-05 13:23:41.156 40 DEBUG tempest.lib.common.rest_client [req-cebddf8f-1a99-4d38-a2d3-895b16b4e557 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '80', 'x-openstack-request-id': 'req-cebddf8f-1a99-4d38-a2d3-895b16b4e557', 'x-compute-request-id': 'req-cebddf8f-1a99-4d38-a2d3-895b16b4e557', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3375'} Body: b'{"itemNotFound": {"code": 404, "message": "Aggregate 3375 could not be found."}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.161 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:41.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.165 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.170 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.170 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.170 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.171 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.172 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.173 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.174 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.175 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.175 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.175 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.175 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.176 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.177 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.178 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.179 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.179 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.179 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.180 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.180 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.180 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.180 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.181 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.181 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.181 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.182 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.182 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.182 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.183 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.183 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.183 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.184 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.184 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.184 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.184 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.185 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.185 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.185 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.185 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.186 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.186 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.186 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.187 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.187 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:index, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:41.188 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:41.215 38 INFO tempest.lib.common.rest_client [req-70f9f636-73a5-4d41-9953-7dc551e5dcdc ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.118s 2020-12-05 13:23:41.216 38 DEBUG tempest.lib.common.rest_client [req-70f9f636-73a5-4d41-9953-7dc551e5dcdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-70f9f636-73a5-4d41-9953-7dc551e5dcdc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.229 39 INFO tempest.lib.common.rest_client [req-2f3c75f7-03f0-44b2-9356-afb26f7b6f88 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.112s 2020-12-05 13:23:41.230 39 DEBUG tempest.lib.common.rest_client [req-2f3c75f7-03f0-44b2-9356-afb26f7b6f88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password": "N6_V1Lq^Lv^pui*", "project_id": "16c6136a5101450b82f67f0e92e7a213", "email": "tempest-NovaAvailabilityZoneRbacTest-755215772@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2f3c75f7-03f0-44b2-9356-afb26f7b6f88', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "16c6136a5101450b82f67f0e92e7a213", "email": "tempest-NovaAvailabilityZoneRbacTest-755215772@example.com", "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/53ab85a90fd54e8f9e87889175dee7bb"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.240 41 INFO tempest.lib.common.rest_client [req-c3d6fb98-196c-452d-b5b4-41f009af6253 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 200 GET http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles 0.097s 2020-12-05 13:23:41.240 41 DEBUG tempest.lib.common.rest_client [req-c3d6fb98-196c-452d-b5b4-41f009af6253 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c3d6fb98-196c-452d-b5b4-41f009af6253', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4/users/45ac9e9e326c499eb352355a745c51d7/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.241 40 INFO tempest.lib.common.rest_client [req-b22dfc4d-1117-43da-97fd-ffd48a080e30 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.053s 2020-12-05 13:23:41.242 40 DEBUG tempest.lib.common.rest_client [req-b22dfc4d-1117-43da-97fd-ffd48a080e30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b22dfc4d-1117-43da-97fd-ffd48a080e30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.278 39 INFO tempest.lib.common.rest_client [req-c9e724eb-d509-4820-bb1e-128365a18fb9 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-12-05 13:23:41.278 39 DEBUG tempest.lib.common.rest_client [req-c9e724eb-d509-4820-bb1e-128365a18fb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9e724eb-d509-4820-bb1e-128365a18fb9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.306 38 INFO tempest.lib.common.rest_client [req-32775d11-61e1-4e9c-903d-8b3ba7dae1f8 ] Request (ImagesMetadataRbacTest:test_list_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-05 13:23:41.306 38 DEBUG tempest.lib.common.rest_client [req-32775d11-61e1-4e9c-903d-8b3ba7dae1f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32775d11-61e1-4e9c-903d-8b3ba7dae1f8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["wFKRWm-jRaOoDzv5wrYsgQ"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.308 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:41.308 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.310 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:41.321 41 INFO tempest.lib.common.rest_client [req-5d0ec6ee-769e-4256-a93b-b80fc3229be8 ] Request (FlavorExtraSpecsRbacTest:test_update_flavor_extra_spec): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:41.322 41 DEBUG tempest.lib.common.rest_client [req-5d0ec6ee-769e-4256-a93b-b80fc3229be8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6640', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d0ec6ee-769e-4256-a93b-b80fc3229be8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "45ac9e9e326c499eb352355a745c51d7", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986", "password_expires_at": null}, "audit_ids": ["ju_9h2Q5RrSLS0aZRkWyNA"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "ddbd93eba47145c191192a68a3b059c4", "name": "tempest-FlavorExtraSpecsRbacTest-1776318986"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_ddbd93eba47145c191192a68a3b059c4", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.328 40 INFO tempest.lib.common.rest_client [req-ee71c9e1-1a60-476f-a7d0-0a6a717fb6cf ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-05 13:23:41.329 40 DEBUG tempest.lib.common.rest_client [req-ee71c9e1-1a60-476f-a7d0-0a6a717fb6cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee71c9e1-1a60-476f-a7d0-0a6a717fb6cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["Sf6LIsXdQmmKzUkY7AelyA"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.331 39 INFO tempest.lib.common.rest_client [req-5ca65343-1514-474a-a21f-e209b21cd93b ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-12-05 13:23:41.332 39 DEBUG tempest.lib.common.rest_client [req-5ca65343-1514-474a-a21f-e209b21cd93b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ca65343-1514-474a-a21f-e209b21cd93b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.410 39 INFO tempest.lib.common.rest_client [req-b1541a7b-9ab5-4d62-86c9-616b00aeb442 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles/72a4576c553448cd941b052c1ca0cf2d 0.077s 2020-12-05 13:23:41.410 39 DEBUG tempest.lib.common.rest_client [req-b1541a7b-9ab5-4d62-86c9-616b00aeb442 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1541a7b-9ab5-4d62-86c9-616b00aeb442', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.411 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NovaAvailabilityZoneRbacTest-1257149122', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '16c6136a5101450b82f67f0e92e7a213', 'project_name': 'tempest-NovaAvailabilityZoneRbacTest-1257149122', 'tenant_id': '16c6136a5101450b82f67f0e92e7a213', 'tenant_name': 'tempest-NovaAvailabilityZoneRbacTest-1257149122', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '53ab85a90fd54e8f9e87889175dee7bb'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:41.411 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-NovaAvailabilityZoneRbacTest-1257149122', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '16c6136a5101450b82f67f0e92e7a213', 'project_name': 'tempest-NovaAvailabilityZoneRbacTest-1257149122', 'tenant_id': '16c6136a5101450b82f67f0e92e7a213', 'tenant_name': 'tempest-NovaAvailabilityZoneRbacTest-1257149122', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '53ab85a90fd54e8f9e87889175dee7bb'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:41.534 39 INFO tempest.lib.common.rest_client [req-fe09eade-f0d3-4943-8225-39db48caa9c6 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.112s 2020-12-05 13:23:41.535 39 DEBUG tempest.lib.common.rest_client [req-fe09eade-f0d3-4943-8225-39db48caa9c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6587', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe09eade-f0d3-4943-8225-39db48caa9c6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password_expires_at": null}, "audit_ids": ["95oSXJDFTg6sI4SCoWBsdg"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "u _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.576 40 INFO tempest.lib.common.rest_client [req-aac9017c-807c-4a2d-b406-d5255ed0717f ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-aggregates 0.245s 2020-12-05 13:23:41.577 40 DEBUG tempest.lib.common.rest_client [req-aac9017c-807c-4a2d-b406-d5255ed0717f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '18', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aac9017c-807c-4a2d-b406-d5255ed0717f', 'x-compute-request-id': 'req-aac9017c-807c-4a2d-b406-d5255ed0717f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregates": []}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.581 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:41.602 41 INFO tempest.lib.common.rest_client [req-a94cb198-a2cb-4d7b-9483-f1911ed0f8a9 ] Request (FlavorExtraSpecsRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-615151508 0.278s 2020-12-05 13:23:41.602 41 DEBUG tempest.lib.common.rest_client [req-a94cb198-a2cb-4d7b-9483-f1911ed0f8a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a94cb198-a2cb-4d7b-9483-f1911ed0f8a9', 'x-compute-request-id': 'req-a94cb198-a2cb-4d7b-9483-f1911ed0f8a9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226/os-extra_specs/tempest-FlavorExtraSpecsRbacTest-key-615151508'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.634 39 INFO tempest.lib.common.rest_client [req-a8b4ee36-690a-4895-b2a5-b1e381162ba7 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-05 13:23:41.635 39 DEBUG tempest.lib.common.rest_client [req-a8b4ee36-690a-4895-b2a5-b1e381162ba7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8b4ee36-690a-4895-b2a5-b1e381162ba7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["dzO1xgkaQ3yNLbAn8sXkVw"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.639 41 INFO tempest.lib.common.rest_client [req-ec474c13-54a4-4a80-a9c5-06cdc024d7d6 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226 0.032s 2020-12-05 13:23:41.640 41 DEBUG tempest.lib.common.rest_client [req-ec474c13-54a4-4a80-a9c5-06cdc024d7d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ec474c13-54a4-4a80-a9c5-06cdc024d7d6', 'x-compute-request-id': 'req-ec474c13-54a4-4a80-a9c5-06cdc024d7d6', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/bfa035c1-e22a-4d9c-b511-0483fb2a9226'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.677 41 INFO tempest.lib.common.rest_client [req-1cf8dcd6-4aab-4609-a8e8-461976f1794f ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.036s 2020-12-05 13:23:41.677 41 DEBUG tempest.lib.common.rest_client [req-1cf8dcd6-4aab-4609-a8e8-461976f1794f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1cf8dcd6-4aab-4609-a8e8-461976f1794f', 'x-compute-request-id': 'req-1cf8dcd6-4aab-4609-a8e8-461976f1794f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "010a6385-3d37-479f-8924-349c195d1429", "name": "patrole_admin-flavor_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/010a6385-3d37-479f-8924-349c195d1429"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/010a6385-3d37-479f-8924-349c195d1429"}]}, {"id": "056424e1-8ec9-40e7-8c57-c819c5871f0e", "name": "patrole_admin-flavor_alt_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}]}, {"id": "05676930-0cf0-4112-96d5-c20d9d968784", "name": "tempest_slow-flavor_alt_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}]}, {"id": "0c1f2caa-cd64-454f-aac1-d85149f62f69", "name": "rally_verify_1bb95e6a_rwMloXB6", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.685 40 INFO tempest.lib.common.rest_client [req-d2dfc953-6c99-48b2-81ec-48ab3eb09b50 ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.104s 2020-12-05 13:23:41.686 40 DEBUG tempest.lib.common.rest_client [req-d2dfc953-6c99-48b2-81ec-48ab3eb09b50 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d2dfc953-6c99-48b2-81ec-48ab3eb09b50', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.687 39 INFO tempest.lib.common.rest_client [req-d9da1295-018a-4f5e-9220-4964d5ad8bb9 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-05 13:23:41.687 39 DEBUG tempest.lib.common.rest_client [req-d9da1295-018a-4f5e-9220-4964d5ad8bb9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9da1295-018a-4f5e-9220-4964d5ad8bb9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["lfPuo--pR4yJls3kk3woBg"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.725 40 INFO tempest.lib.common.rest_client [req-6272c760-641b-4c09-a6c6-e630f08be3cb ] Request (AggregatesRbacTest:test_list_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:41.726 40 DEBUG tempest.lib.common.rest_client [req-6272c760-641b-4c09-a6c6-e630f08be3cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6272c760-641b-4c09-a6c6-e630f08be3cb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["VvdvZeiFRo2yw1e2__tpEQ"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.731 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:41.732 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.732 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.733 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.734 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.734 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.735 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.736 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.736 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.737 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.737 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.737 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.738 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.738 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.738 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.739 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.739 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.739 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.740 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.740 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.740 39 INFO tempest.lib.common.rest_client [req-8a12021d-de32-4a65-b05a-37db4a27bb81 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-12-05 13:23:41.740 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.741 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.741 39 DEBUG tempest.lib.common.rest_client [req-8a12021d-de32-4a65-b05a-37db4a27bb81 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a12021d-de32-4a65-b05a-37db4a27bb81', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.741 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.741 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.742 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.742 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.742 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.743 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.743 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.743 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.744 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.744 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.744 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.745 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.745 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.745 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.745 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.746 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.746 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.747 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.747 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.747 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.748 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.748 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.748 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.749 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.749 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.749 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.750 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.750 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.750 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.751 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.751 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.751 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.752 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.752 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.752 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.752 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.753 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.753 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.753 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.754 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.754 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.755 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.755 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.755 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.755 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.756 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.756 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.756 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.757 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.757 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.757 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.757 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.758 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.758 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:41.759 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:remove_host, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:41.787 39 INFO tempest.lib.common.rest_client [req-8ecd1390-58f4-4f53-9f2d-a85c8393f7b5 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-12-05 13:23:41.788 39 DEBUG tempest.lib.common.rest_client [req-8ecd1390-58f4-4f53-9f2d-a85c8393f7b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ecd1390-58f4-4f53-9f2d-a85c8393f7b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.789 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:41.789 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:41.843 39 INFO tempest.lib.common.rest_client [req-780796e5-fff3-43cf-abd3-14a74dd87214 ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles 0.053s 2020-12-05 13:23:41.844 39 DEBUG tempest.lib.common.rest_client [req-780796e5-fff3-43cf-abd3-14a74dd87214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-780796e5-fff3-43cf-abd3-14a74dd87214', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.845 41 INFO tempest.lib.common.rest_client [req-10163ef2-3eff-4551-95f2-4434980a780b ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/45ac9e9e326c499eb352355a745c51d7 0.148s 2020-12-05 13:23:41.846 41 DEBUG tempest.lib.common.rest_client [req-10163ef2-3eff-4551-95f2-4434980a780b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10163ef2-3eff-4551-95f2-4434980a780b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/45ac9e9e326c499eb352355a745c51d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.864 38 INFO tempest.lib.common.rest_client [req-43e24b5a-e893-42cb-8b67-c16d27457e67 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata 0.553s 2020-12-05 13:23:41.864 38 DEBUG tempest.lib.common.rest_client [req-43e24b5a-e893-42cb-8b67-c16d27457e67 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-43e24b5a-e893-42cb-8b67-c16d27457e67', 'x-compute-request-id': 'req-43e24b5a-e893-42cb-8b67-c16d27457e67', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.866 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:41.881 40 INFO tempest.lib.common.rest_client [req-5a59ccdb-b587-4668-b97e-59c462cf9cab ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.121s 2020-12-05 13:23:41.881 40 DEBUG tempest.lib.common.rest_client [req-5a59ccdb-b587-4668-b97e-59c462cf9cab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1877972522"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5a59ccdb-b587-4668-b97e-59c462cf9cab', 'x-compute-request-id': 'req-5a59ccdb-b587-4668-b97e-59c462cf9cab', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3376, "name": "tempest-AggregatesRbacTest-aggregate-1877972522", "created_at": "2020-12-05T13:23:41.869558", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.932 41 INFO tempest.lib.common.rest_client [req-13eb21a3-24ba-4630-b6fe-bc067ae4ed77 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-05 13:23:41.932 41 DEBUG tempest.lib.common.rest_client [req-13eb21a3-24ba-4630-b6fe-bc067ae4ed77 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13eb21a3-24ba-4630-b6fe-bc067ae4ed77', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["y1zFrMDuRj6D1qPWhXsbCg"], "expires_at": "2020-12-05T14:23:41.000000Z", "issued_at": "2020-12-05T13:23:41.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.948 39 INFO tempest.lib.common.rest_client [req-901f9433-b6c3-4918-88a2-c2b2e60cb71b ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles/72a4576c553448cd941b052c1ca0cf2d 0.103s 2020-12-05 13:23:41.948 39 DEBUG tempest.lib.common.rest_client [req-901f9433-b6c3-4918-88a2-c2b2e60cb71b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-901f9433-b6c3-4918-88a2-c2b2e60cb71b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:41.983 38 INFO tempest.lib.common.rest_client [req-3dce78b4-928d-4dc7-b21c-e22608462112 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.116s 2020-12-05 13:23:41.984 38 DEBUG tempest.lib.common.rest_client [req-3dce78b4-928d-4dc7-b21c-e22608462112 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3dce78b4-928d-4dc7-b21c-e22608462112', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.061 39 INFO tempest.lib.common.rest_client [req-2edbb089-7bd2-4081-b938-f81c43cbd70c ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles/a629c95d64b3416fb80ae90af4f69c05 0.111s 2020-12-05 13:23:42.062 39 DEBUG tempest.lib.common.rest_client [req-2edbb089-7bd2-4081-b938-f81c43cbd70c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2edbb089-7bd2-4081-b938-f81c43cbd70c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.068 38 INFO tempest.lib.common.rest_client [req-a8413117-57b0-4aa0-a3af-f3a01583e725 ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:42.069 38 DEBUG tempest.lib.common.rest_client [req-a8413117-57b0-4aa0-a3af-f3a01583e725 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8413117-57b0-4aa0-a3af-f3a01583e725', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["sB3WvjtOTvOr3QRlvKlbxw"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.217 40 INFO tempest.lib.common.rest_client [req-e21ad105-0cc7-403f-9be4-d2a8f5a38680 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/3376/action 0.332s 2020-12-05 13:23:42.218 40 DEBUG tempest.lib.common.rest_client [req-e21ad105-0cc7-403f-9be4-d2a8f5a38680 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"add_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:41 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '257', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e21ad105-0cc7-403f-9be4-d2a8f5a38680', 'x-compute-request-id': 'req-e21ad105-0cc7-403f-9be4-d2a8f5a38680', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3376/action'} Body: b'{"aggregate": {"id": 3376, "name": "tempest-AggregatesRbacTest-aggregate-1877972522", "hosts": ["lf-virtual9"], "metadata": {}, "created_at": "2020-12-05T13:23:42.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.223 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:42.279 40 INFO tempest.lib.common.rest_client [req-a9c16d8a-5e1c-4fde-9d56-be021858d9e1 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.055s 2020-12-05 13:23:42.280 40 DEBUG tempest.lib.common.rest_client [req-a9c16d8a-5e1c-4fde-9d56-be021858d9e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9c16d8a-5e1c-4fde-9d56-be021858d9e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.362 40 INFO tempest.lib.common.rest_client [req-d26cf54b-22ef-4586-90a7-c5103764be68 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-12-05 13:23:42.363 40 DEBUG tempest.lib.common.rest_client [req-d26cf54b-22ef-4586-90a7-c5103764be68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d26cf54b-22ef-4586-90a7-c5103764be68', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["v3Gh1mD1ScyPNMNkrIve8Q"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.381 38 INFO tempest.lib.common.rest_client [req-32439ee8-f648-4646-b02e-cd8c3d6490fa ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.311s 2020-12-05 13:23:42.382 38 DEBUG tempest.lib.common.rest_client [req-32439ee8-f648-4646-b02e-cd8c3d6490fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '24', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32439ee8-f648-4646-b02e-cd8c3d6490fa', 'x-compute-request-id': 'req-32439ee8-f648-4646-b02e-cd8c3d6490fa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'{"meta": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.384 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:42.446 38 INFO tempest.lib.common.rest_client [req-a3924382-25ff-4a7c-9c4f-eb84a93726ae ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.061s 2020-12-05 13:23:42.447 38 DEBUG tempest.lib.common.rest_client [req-a3924382-25ff-4a7c-9c4f-eb84a93726ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a3924382-25ff-4a7c-9c4f-eb84a93726ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.489 38 INFO tempest.lib.common.rest_client [req-6f0b8596-98ff-44e1-9329-b48ad42a5cdd ] Request (ImagesMetadataRbacTest:test_show_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:23:42.489 38 DEBUG tempest.lib.common.rest_client [req-6f0b8596-98ff-44e1-9329-b48ad42a5cdd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f0b8596-98ff-44e1-9329-b48ad42a5cdd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["Z0p91i1BS26wP9U7L2OyKA"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.509 41 INFO tempest.lib.common.rest_client [req-4e9bf5bc-5887-4273-87bc-cf14f7680a66 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ddbd93eba47145c191192a68a3b059c4&name=default 0.576s 2020-12-05 13:23:42.510 41 DEBUG tempest.lib.common.rest_client [req-4e9bf5bc-5887-4273-87bc-cf14f7680a66 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4e9bf5bc-5887-4273-87bc-cf14f7680a66', 'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=ddbd93eba47145c191192a68a3b059c4&name=default'} Body: b'{"security_groups": [{"id": "07515dc6-4a83-4083-b178-dea03d011caf", "name": "default", "stateful": true, "tenant_id": "ddbd93eba47145c191192a68a3b059c4", "description": "Default security group", "security_group_rules": [{"id": "268e8e8a-e3e0-4862-bf6c-17d030bdd72a", "tenant_id": "ddbd93eba47145c191192a68a3b059c4", "security_group_id": "07515dc6-4a83-4083-b178-dea03d011caf", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:42Z", "updated_at": "2020-12-05T13:23:42Z", "revision_number": 0, "project_id": "ddbd93eba47145c191192a68a3b059c4"}, {"id": "28614e0e-8ee0-4b23-84de-1b22a0b08343", "tenant_id": "ddbd93eba47145c191192a68a3b059c4", "security_group_id": "07515dc6-4a83-4083-b178-dea03d011caf", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "07515dc6-4a83-4083-b178-dea03d011caf", "description": null, "tags": [], "created_at": "2020-12-05T13:23:42Z", "updated_at": "2020-12-05T13:23:42Z", "revision_number": 0, "project_id": "ddbd93eba47145c191192a68a3b059c4"}, {"id": "3c40e11b-ce1c-48c4-bfc8-f2aa55b2678e", "tenant_id": "ddbd93eba47145c191192a68a3b059c4", "security_group_id": "07515dc6-4a83-4083-b178-dea03d011caf", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:42Z", "updated_at": "2020-12-05T13:23:42Z", "revision_number": 0, "project_id": "ddbd93eba47145c191192a68a3b059c4"}, {"id": "ffdcc267-5062-4b42-82f4-5a4a974bacf9", "tenant_id": "ddbd93eba47145c191192a68a3b059c4", "security_group_id": "07515dc6-4a83-4083-b178-dea03d011caf", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "07515dc6-4a83-4083-b178-dea03d011caf", "description": null, "tags": [], "created_at": "2020-12-05T13:23:42Z", "updated_at": "2020-12-05T13:23:42Z", "revision_number": 0, "project_id": "ddbd93eba47145c191192a68a3b059c4"}], "tags": [], "created_at": "2020-12-05T13:23:42Z", "updated_at": "2020-12-05T13:23:42Z", "revision_number": 1, "project_id": "ddbd93eba47145c191192a68a3b059c4"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.641 41 INFO tempest.lib.common.rest_client [req-66ddea02-9c1d-4fb4-ad45-f21bfec331a3 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/07515dc6-4a83-4083-b178-dea03d011caf 0.131s 2020-12-05 13:23:42.642 41 DEBUG tempest.lib.common.rest_client [req-66ddea02-9c1d-4fb4-ad45-f21bfec331a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-66ddea02-9c1d-4fb4-ad45-f21bfec331a3', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/07515dc6-4a83-4083-b178-dea03d011caf'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.707 40 INFO tempest.lib.common.rest_client [req-ac99d312-2a89-42c6-9267-f99ac26e97b4 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/3376/action 0.343s 2020-12-05 13:23:42.708 40 DEBUG tempest.lib.common.rest_client [req-ac99d312-2a89-42c6-9267-f99ac26e97b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac99d312-2a89-42c6-9267-f99ac26e97b4', 'x-compute-request-id': 'req-ac99d312-2a89-42c6-9267-f99ac26e97b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3376/action'} Body: b'{"aggregate": {"id": 3376, "name": "tempest-AggregatesRbacTest-aggregate-1877972522", "hosts": [], "metadata": {}, "created_at": "2020-12-05T13:23:42.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.713 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:42.774 40 INFO tempest.lib.common.rest_client [req-71c94351-e232-4451-ab64-cfa04957092e ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.059s 2020-12-05 13:23:42.774 40 DEBUG tempest.lib.common.rest_client [req-71c94351-e232-4451-ab64-cfa04957092e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71c94351-e232-4451-ab64-cfa04957092e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.802 41 INFO tempest.lib.common.rest_client [req-56123218-62c8-4275-bab9-8cb08c61d3f9 ] Request (FlavorExtraSpecsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4 0.159s 2020-12-05 13:23:42.803 41 DEBUG tempest.lib.common.rest_client [req-56123218-62c8-4275-bab9-8cb08c61d3f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56123218-62c8-4275-bab9-8cb08c61d3f9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/ddbd93eba47145c191192a68a3b059c4'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.845 38 INFO tempest.lib.common.rest_client [req-aab1d8da-b434-4c81-8acb-5bfee7f90258 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.354s 2020-12-05 13:23:42.846 38 DEBUG tempest.lib.common.rest_client [req-aab1d8da-b434-4c81-8acb-5bfee7f90258 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aab1d8da-b434-4c81-8acb-5bfee7f90258', 'x-compute-request-id': 'req-aab1d8da-b434-4c81-8acb-5bfee7f90258', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.848 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:42.849 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:42.850 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:42.850 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:42.869 40 INFO tempest.lib.common.rest_client [req-41624b61-f2d5-40ce-8072-4862f6669091 ] Request (AggregatesRbacTest:test_remove_host_from_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.094s 2020-12-05 13:23:42.870 40 DEBUG tempest.lib.common.rest_client [req-41624b61-f2d5-40ce-8072-4862f6669091 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41624b61-f2d5-40ce-8072-4862f6669091', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["YpSe6NAHQOe7RzSHG1CllA"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.893 41 INFO tempest.lib.common.rest_client [req-5632c2aa-6232-451e-92f8-0ded6f1e45fc ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-05 13:23:42.894 41 DEBUG tempest.lib.common.rest_client [req-5632c2aa-6232-451e-92f8-0ded6f1e45fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5632c2aa-6232-451e-92f8-0ded6f1e45fc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["iyIu4eG8RQmCi7LKOC13vQ"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.941 41 INFO tempest.lib.common.rest_client [req-a110a06f-7cb8-43af-bfa2-cd47bee1113a ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:42.941 41 DEBUG tempest.lib.common.rest_client [req-a110a06f-7cb8-43af-bfa2-cd47bee1113a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a110a06f-7cb8-43af-bfa2-cd47bee1113a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["3YglzMY0TH6FiDggdcNgHg"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.970 38 INFO tempest.lib.common.rest_client [req-0e4e721b-358d-4a81-a2e0-90b0e3c21da8 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.119s 2020-12-05 13:23:42.971 38 DEBUG tempest.lib.common.rest_client [req-0e4e721b-358d-4a81-a2e0-90b0e3c21da8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e4e721b-358d-4a81-a2e0-90b0e3c21da8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:42.996 41 INFO tempest.lib.common.rest_client [req-7c7442dd-eb54-4c44-adc1-631a311c3b89 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.053s 2020-12-05 13:23:42.996 41 DEBUG tempest.lib.common.rest_client [req-7c7442dd-eb54-4c44-adc1-631a311c3b89 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7c7442dd-eb54-4c44-adc1-631a311c3b89', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.051 38 INFO tempest.lib.common.rest_client [req-84889df7-61cf-408d-958a-f186e1c8fcfc ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:23:43.052 38 DEBUG tempest.lib.common.rest_client [req-84889df7-61cf-408d-958a-f186e1c8fcfc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84889df7-61cf-408d-958a-f186e1c8fcfc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["AAcJH799Q2utjOR9FzhNMg"], "expires_at": "2020-12-05T14:23:42.000000Z", "issued_at": "2020-12-05T13:23:42.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.060 41 INFO tempest.lib.common.rest_client [req-18c2c9ad-d858-46c2-8c11-020a7beaaacb ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.062s 2020-12-05 13:23:43.061 41 DEBUG tempest.lib.common.rest_client [req-18c2c9ad-d858-46c2-8c11-020a7beaaacb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorManageRbacTest-749141839-desc", "domain_id": "default", "name": "tempest-FlavorManageRbacTest-749141839"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-18c2c9ad-d858-46c2-8c11-020a7beaaacb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839", "domain_id": "default", "description": "tempest-FlavorManageRbacTest-749141839-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.097 40 INFO tempest.lib.common.rest_client [req-c2b7c3ec-ab5c-4bdd-8147-44b399120957 ] Request (AggregatesRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/os-aggregates/3376/action 0.224s 2020-12-05 13:23:43.097 40 DEBUG tempest.lib.common.rest_client [req-c2b7c3ec-ab5c-4bdd-8147-44b399120957 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"remove_host": {"host": "lf-virtual9"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:42 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '94', 'x-openstack-request-id': 'req-c2b7c3ec-ab5c-4bdd-8147-44b399120957', 'x-compute-request-id': 'req-c2b7c3ec-ab5c-4bdd-8147-44b399120957', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3376/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Cannot remove host lf-virtual9 in aggregate 3376"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.138 40 INFO tempest.lib.common.rest_client [req-d60af319-3fda-4523-8027-0afbb55be7d3 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3376 0.040s 2020-12-05 13:23:43.139 40 DEBUG tempest.lib.common.rest_client [req-d60af319-3fda-4523-8027-0afbb55be7d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d60af319-3fda-4523-8027-0afbb55be7d3', 'x-compute-request-id': 'req-d60af319-3fda-4523-8027-0afbb55be7d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3376'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.143 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:43.144 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.144 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.145 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.145 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.146 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.146 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.147 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.147 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.148 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.148 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.149 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.149 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.150 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.150 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.151 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.151 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.151 39 INFO tempest.lib.common.rest_client [req-441f55f9-c715-4ea9-a38d-09ae99219dab ] Request (NovaAvailabilityZoneRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:43.151 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.152 39 DEBUG tempest.lib.common.rest_client [req-441f55f9-c715-4ea9-a38d-09ae99219dab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-441f55f9-c715-4ea9-a38d-09ae99219dab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password_expires_at": null}, "audit_ids": ["zgg5BDW8RSCJ-Fx-LTVW0g"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.152 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.152 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.153 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.153 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.153 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.154 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.154 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.154 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:43.154 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.154 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.155 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.155 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.155 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.155 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.155 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.156 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.156 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.156 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.156 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.156 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.156 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.157 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.157 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.157 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.157 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.157 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.158 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.158 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.158 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.159 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.159 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.159 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.159 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.159 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.159 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.160 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.160 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.160 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.161 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.161 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.161 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.161 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.162 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.162 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.162 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.162 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.163 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.164 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.164 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.164 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.164 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.165 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.165 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.165 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.165 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.165 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.165 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.166 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.167 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.168 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.169 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.169 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.169 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.169 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.170 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.170 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:set_metadata, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:43.170 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.170 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.171 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.171 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.171 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.171 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.172 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.172 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.172 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.173 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.173 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.174 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.174 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.174 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.175 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.175 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.175 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.176 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.176 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.176 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.177 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.177 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.177 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.178 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.178 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.178 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.179 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.179 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.179 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.179 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.180 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.181 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-availability-zone:detail, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:43.181 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.187 41 INFO tempest.lib.common.rest_client [req-5afbec74-5687-45ac-ab11-498c7eae7e15 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.125s 2020-12-05 13:23:43.187 41 DEBUG tempest.lib.common.rest_client [req-5afbec74-5687-45ac-ab11-498c7eae7e15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorManageRbacTest-749141839", "password": "A1^xE3Eo@OJ9gtA", "project_id": "a90d96e426864b36ba5c94e7289944ec", "email": "tempest-FlavorManageRbacTest-1963557427@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5afbec74-5687-45ac-ab11-498c7eae7e15', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "a90d96e426864b36ba5c94e7289944ec", "email": "tempest-FlavorManageRbacTest-1963557427@example.com", "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/c118d06dc8da4774b81b35d1ba81f088"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.212 40 INFO tempest.lib.common.rest_client [req-f6fc77ad-d267-402a-befc-77ea7cb0136a ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.042s 2020-12-05 13:23:43.213 40 DEBUG tempest.lib.common.rest_client [req-f6fc77ad-d267-402a-befc-77ea7cb0136a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-220415234"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f6fc77ad-d267-402a-befc-77ea7cb0136a', 'x-compute-request-id': 'req-f6fc77ad-d267-402a-befc-77ea7cb0136a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3377, "name": "tempest-AggregatesRbacTest-aggregate-220415234", "created_at": "2020-12-05T13:23:43.193541", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.218 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.238 41 INFO tempest.lib.common.rest_client [req-bc0bac53-1f76-42c2-a3e8-41ed3f8a6307 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-05 13:23:43.239 41 DEBUG tempest.lib.common.rest_client [req-bc0bac53-1f76-42c2-a3e8-41ed3f8a6307 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bc0bac53-1f76-42c2-a3e8-41ed3f8a6307', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.241 39 INFO tempest.lib.common.rest_client [req-4d07aaab-9e1b-4e59-b419-f257e8dcb520 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles 0.059s 2020-12-05 13:23:43.242 39 DEBUG tempest.lib.common.rest_client [req-4d07aaab-9e1b-4e59-b419-f257e8dcb520 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d07aaab-9e1b-4e59-b419-f257e8dcb520', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.274 40 INFO tempest.lib.common.rest_client [req-30d48537-6e61-4418-ae04-6b4494a689a5 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.055s 2020-12-05 13:23:43.275 40 DEBUG tempest.lib.common.rest_client [req-30d48537-6e61-4418-ae04-6b4494a689a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30d48537-6e61-4418-ae04-6b4494a689a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.280 39 INFO tempest.lib.common.rest_client [req-cfdfbc39-9973-46a4-a83c-b3d58e2b4398 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:43.280 39 DEBUG tempest.lib.common.rest_client [req-cfdfbc39-9973-46a4-a83c-b3d58e2b4398 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfdfbc39-9973-46a4-a83c-b3d58e2b4398', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password_expires_at": null}, "audit_ids": ["X8s_bA74QrC0MMtFzA8kOA"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.290 41 INFO tempest.lib.common.rest_client [req-f9ddadc6-44a9-47db-9ac5-b1067d6e9ba7 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-12-05 13:23:43.290 41 DEBUG tempest.lib.common.rest_client [req-f9ddadc6-44a9-47db-9ac5-b1067d6e9ba7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9ddadc6-44a9-47db-9ac5-b1067d6e9ba7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.363 40 INFO tempest.lib.common.rest_client [req-05698b0e-4d36-4bc2-9d0d-c748efc50e93 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:43.364 40 DEBUG tempest.lib.common.rest_client [req-05698b0e-4d36-4bc2-9d0d-c748efc50e93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05698b0e-4d36-4bc2-9d0d-c748efc50e93', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["i7Qgoe67QXqK2dPUpnQGfA"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.365 41 INFO tempest.lib.common.rest_client [req-173e300f-fffa-4225-8027-cc1c5bd72954 ] Request (FlavorManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles/72a4576c553448cd941b052c1ca0cf2d 0.074s 2020-12-05 13:23:43.366 41 DEBUG tempest.lib.common.rest_client [req-173e300f-fffa-4225-8027-cc1c5bd72954 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-173e300f-fffa-4225-8027-cc1c5bd72954', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.366 41 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorManageRbacTest-749141839', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a90d96e426864b36ba5c94e7289944ec', 'project_name': 'tempest-FlavorManageRbacTest-749141839', 'tenant_id': 'a90d96e426864b36ba5c94e7289944ec', 'tenant_name': 'tempest-FlavorManageRbacTest-749141839', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c118d06dc8da4774b81b35d1ba81f088'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:43.367 41 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorManageRbacTest-749141839', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'a90d96e426864b36ba5c94e7289944ec', 'project_name': 'tempest-FlavorManageRbacTest-749141839', 'tenant_id': 'a90d96e426864b36ba5c94e7289944ec', 'tenant_name': 'tempest-FlavorManageRbacTest-749141839', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'c118d06dc8da4774b81b35d1ba81f088'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:43.398 39 INFO tempest.lib.common.rest_client [req-5762bd89-3ec7-4503-b368-b7c54612c518 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone/detail 0.116s 2020-12-05 13:23:43.398 39 DEBUG tempest.lib.common.rest_client [req-5762bd89-3ec7-4503-b368-b7c54612c518 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '607', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5762bd89-3ec7-4503-b368-b7c54612c518', 'x-compute-request-id': 'req-5762bd89-3ec7-4503-b368-b7c54612c518', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone/detail'} Body: b'{"availabilityZoneInfo": [{"zoneName": "internal", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-scheduler": {"available": true, "active": true, "updated_at": "2020-12-05T13:23:39.000000"}, "nova-conductor": {"available": true, "active": true, "updated_at": "2020-12-05T13:23:40.000000"}}}}, {"zoneName": "nova", "zoneState": {"available": true}, "hosts": {"lf-virtual9": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-12-05T13:23:40.000000"}}, "lf-virtual8": {"nova-compute": {"available": true, "active": true, "updated_at": "2020-12-05T13:23:41.000000"}}}}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.405 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.483 41 INFO tempest.lib.common.rest_client [req-9105c379-8063-49e8-b862-22077d47321a ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-05 13:23:43.484 41 DEBUG tempest.lib.common.rest_client [req-9105c379-8063-49e8-b862-22077d47321a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9105c379-8063-49e8-b862-22077d47321a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "password_expires_at": null}, "audit_ids": ["DZwIu1gxSrKGiCWGECBJ9A"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.509 39 INFO tempest.lib.common.rest_client [req-092186c0-4eb2-4e5f-af3b-b7e85fc156fd ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 200 GET http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles 0.103s 2020-12-05 13:23:43.510 39 DEBUG tempest.lib.common.rest_client [req-092186c0-4eb2-4e5f-af3b-b7e85fc156fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-092186c0-4eb2-4e5f-af3b-b7e85fc156fd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.520 41 INFO tempest.lib.common.rest_client [req-e5dfd7cd-c046-40ba-b033-1152fe966e95 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:43.520 41 DEBUG tempest.lib.common.rest_client [req-e5dfd7cd-c046-40ba-b033-1152fe966e95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5dfd7cd-c046-40ba-b033-1152fe966e95', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["Fjpmrct4Spal46UoGwvZOg"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.567 41 INFO tempest.lib.common.rest_client [req-2ed5377b-76b9-4e1c-a577-40fe71a620f4 ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:43.568 41 DEBUG tempest.lib.common.rest_client [req-2ed5377b-76b9-4e1c-a577-40fe71a620f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ed5377b-76b9-4e1c-a577-40fe71a620f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["Dl_unXv2S_yRz_Y404pLZA"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.576 38 INFO tempest.lib.common.rest_client [req-539c0e9d-97a5-4aa4-b05a-1b92f6f58762 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 PUT http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata 0.523s 2020-12-05 13:23:43.577 38 DEBUG tempest.lib.common.rest_client [req-539c0e9d-97a5-4aa4-b05a-1b92f6f58762 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"metadata": {"foo": "bar"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '28', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-539c0e9d-97a5-4aa4-b05a-1b92f6f58762', 'x-compute-request-id': 'req-539c0e9d-97a5-4aa4-b05a-1b92f6f58762', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata'} Body: b'{"metadata": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.580 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.601 39 INFO tempest.lib.common.rest_client [req-f130df94-dd28-4631-9eee-f9e71bd19f74 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_detail_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:43.602 39 DEBUG tempest.lib.common.rest_client [req-f130df94-dd28-4631-9eee-f9e71bd19f74 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f130df94-dd28-4631-9eee-f9e71bd19f74', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password_expires_at": null}, "audit_ids": ["uOuMZ2eNSbq8wDW9k_kb-Q"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.606 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:43.606 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.607 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.608 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.609 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.610 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.611 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.612 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.613 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.614 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.615 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.616 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.616 41 INFO tempest.lib.common.rest_client [req-fd1a9043-9011-4294-a715-e5fe191fd4d9 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-12-05 13:23:43.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.617 41 DEBUG tempest.lib.common.rest_client [req-fd1a9043-9011-4294-a715-e5fe191fd4d9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd1a9043-9011-4294-a715-e5fe191fd4d9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.617 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.618 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.619 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.620 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.621 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.622 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.623 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.624 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.625 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.625 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.626 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.627 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.628 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.629 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:43.630 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-availability-zone:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:43.630 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.636 38 INFO tempest.lib.common.rest_client [req-81ae81f1-bc9d-4f54-b81a-fc1059a33f94 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.055s 2020-12-05 13:23:43.637 38 DEBUG tempest.lib.common.rest_client [req-81ae81f1-bc9d-4f54-b81a-fc1059a33f94 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-81ae81f1-bc9d-4f54-b81a-fc1059a33f94', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.667 41 INFO tempest.lib.common.rest_client [req-f45d0c0c-962e-4420-8f95-2701d173c14a ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-12-05 13:23:43.667 41 DEBUG tempest.lib.common.rest_client [req-f45d0c0c-962e-4420-8f95-2701d173c14a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f45d0c0c-962e-4420-8f95-2701d173c14a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.668 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:43.668 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.691 39 INFO tempest.lib.common.rest_client [req-66a6d2e3-bad1-4423-953d-b8c5264d5bef ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles 0.060s 2020-12-05 13:23:43.691 39 DEBUG tempest.lib.common.rest_client [req-66a6d2e3-bad1-4423-953d-b8c5264d5bef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66a6d2e3-bad1-4423-953d-b8c5264d5bef', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.723 41 INFO tempest.lib.common.rest_client [req-fe630e5e-ee2d-435c-9017-fb55ce711f04 ] Request (FlavorManageRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles 0.054s 2020-12-05 13:23:43.724 41 DEBUG tempest.lib.common.rest_client [req-fe630e5e-ee2d-435c-9017-fb55ce711f04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe630e5e-ee2d-435c-9017-fb55ce711f04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.728 38 INFO tempest.lib.common.rest_client [req-11daac47-6c06-4bcf-9b97-a096adbfd3a7 ] Request (ImagesMetadataRbacTest:test_update_image_metadata): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-05 13:23:43.728 38 DEBUG tempest.lib.common.rest_client [req-11daac47-6c06-4bcf-9b97-a096adbfd3a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11daac47-6c06-4bcf-9b97-a096adbfd3a7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["4WaVqsl0RJCI2i5woPlngQ"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.732 39 INFO tempest.lib.common.rest_client [req-85b3d49a-1730-4c55-9a93-c972c896b58b ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:23:43.733 39 DEBUG tempest.lib.common.rest_client [req-85b3d49a-1730-4c55-9a93-c972c896b58b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85b3d49a-1730-4c55-9a93-c972c896b58b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password_expires_at": null}, "audit_ids": ["K0hZDhIoRcGL93zztyh94Q"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.746 40 INFO tempest.lib.common.rest_client [req-b9425566-ad56-4870-b099-836bfce66a2b ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates/3377/action 0.380s 2020-12-05 13:23:43.746 40 DEBUG tempest.lib.common.rest_client [req-b9425566-ad56-4870-b099-836bfce66a2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"set_metadata": {"metadata": {"tempest-AggregatesRbacTest-key-891146674": "tempest-AggregatesRbacTest-val-2143464468"}}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '354', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b9425566-ad56-4870-b099-836bfce66a2b', 'x-compute-request-id': 'req-b9425566-ad56-4870-b099-836bfce66a2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3377/action'} Body: b'{"aggregate": {"id": 3377, "name": "tempest-AggregatesRbacTest-aggregate-220415234", "hosts": [], "metadata": {"tempest-AggregatesRbacTest-key-891146674": "tempest-AggregatesRbacTest-val-2143464468"}, "created_at": "2020-12-05T13:23:43.000000", "updated_at": "2020-12-05T13:23:43.743246", "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.750 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.795 41 INFO tempest.lib.common.rest_client [req-d9f24af7-213d-4b47-95bb-04f755ac1ce6 ] Request (FlavorManageRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles/72a4576c553448cd941b052c1ca0cf2d 0.070s 2020-12-05 13:23:43.796 41 DEBUG tempest.lib.common.rest_client [req-d9f24af7-213d-4b47-95bb-04f755ac1ce6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9f24af7-213d-4b47-95bb-04f755ac1ce6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.799 40 INFO tempest.lib.common.rest_client [req-12777d9b-156f-4257-b66e-3fb35ed85f65 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.048s 2020-12-05 13:23:43.800 40 DEBUG tempest.lib.common.rest_client [req-12777d9b-156f-4257-b66e-3fb35ed85f65 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12777d9b-156f-4257-b66e-3fb35ed85f65', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.837 39 INFO tempest.lib.common.rest_client [req-8f2e6aca-ef0e-41ca-9a94-595125c784ce ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-availability-zone 0.102s 2020-12-05 13:23:43.837 39 DEBUG tempest.lib.common.rest_client [req-8f2e6aca-ef0e-41ca-9a94-595125c784ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '97', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8f2e6aca-ef0e-41ca-9a94-595125c784ce', 'x-compute-request-id': 'req-8f2e6aca-ef0e-41ca-9a94-595125c784ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-availability-zone'} Body: b'{"availabilityZoneInfo": [{"zoneName": "nova", "zoneState": {"available": true}, "hosts": null}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.840 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:43.881 40 INFO tempest.lib.common.rest_client [req-551449d1-a674-4749-90e3-1f367a720443 ] Request (AggregatesRbacTest:test_set_metadata_on_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:43.881 40 DEBUG tempest.lib.common.rest_client [req-551449d1-a674-4749-90e3-1f367a720443 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-551449d1-a674-4749-90e3-1f367a720443', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["PKL2HusnRxORj_7EYGC91w"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.911 41 INFO tempest.lib.common.rest_client [req-5b27bad3-5a4d-4ffe-9bbd-951d5697b82b ] Request (FlavorManageRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles/a629c95d64b3416fb80ae90af4f69c05 0.114s 2020-12-05 13:23:43.912 41 DEBUG tempest.lib.common.rest_client [req-5b27bad3-5a4d-4ffe-9bbd-951d5697b82b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b27bad3-5a4d-4ffe-9bbd-951d5697b82b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:43.951 39 INFO tempest.lib.common.rest_client [req-16273f29-4c30-405e-95e9-d1056f3d6c07 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 200 GET http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles 0.111s 2020-12-05 13:23:43.952 39 DEBUG tempest.lib.common.rest_client [req-16273f29-4c30-405e-95e9-d1056f3d6c07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16273f29-4c30-405e-95e9-d1056f3d6c07', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213/users/53ab85a90fd54e8f9e87889175dee7bb/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.061 39 INFO tempest.lib.common.rest_client [req-e6be1956-2e74-4adb-b8a8-629ed99aef60 ] Request (NovaAvailabilityZoneRbacTest:test_get_availability_zone_list_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-05 13:23:44.062 39 DEBUG tempest.lib.common.rest_client [req-e6be1956-2e74-4adb-b8a8-629ed99aef60 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6648', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6be1956-2e74-4adb-b8a8-629ed99aef60', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "53ab85a90fd54e8f9e87889175dee7bb", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122", "password_expires_at": null}, "audit_ids": ["N19vbYFtR8Ka4_INRMVPJQ"], "expires_at": "2020-12-05T14:23:43.000000Z", "issued_at": "2020-12-05T13:23:43.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "16c6136a5101450b82f67f0e92e7a213", "name": "tempest-NovaAvailabilityZoneRbacTest-1257149122"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_16c6136a5101450b82f67f0e92e7a213", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5b _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.100 40 INFO tempest.lib.common.rest_client [req-c7ee9114-1768-4038-8964-56540a0a7173 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3377 0.217s 2020-12-05 13:23:44.100 40 DEBUG tempest.lib.common.rest_client [req-c7ee9114-1768-4038-8964-56540a0a7173 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c7ee9114-1768-4038-8964-56540a0a7173', 'x-compute-request-id': 'req-c7ee9114-1768-4038-8964-56540a0a7173', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3377'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.104 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:44.105 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.105 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.106 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.107 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.107 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.108 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.109 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.110 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.111 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.111 38 INFO tempest.lib.common.rest_client [req-2bd5bab5-58c1-4659-a4f8-28b654d6ebb8 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.381s 2020-12-05 13:23:44.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.112 38 DEBUG tempest.lib.common.rest_client [req-2bd5bab5-58c1-4659-a4f8-28b654d6ebb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:43 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2bd5bab5-58c1-4659-a4f8-28b654d6ebb8', 'x-compute-request-id': 'req-2bd5bab5-58c1-4659-a4f8-28b654d6ebb8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.112 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.113 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.114 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.114 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:44.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.115 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.116 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.117 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: modify_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:44.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.117 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.117 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:44.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.118 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.119 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.120 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.121 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.122 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.123 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.123 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.124 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.124 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.125 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.126 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.127 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.127 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.127 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.128 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.129 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.129 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.129 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.130 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:44.166 40 INFO tempest.lib.common.rest_client [req-f010f28e-0c80-4694-b24e-9c9233141b00 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.035s 2020-12-05 13:23:44.166 40 DEBUG tempest.lib.common.rest_client [req-f010f28e-0c80-4694-b24e-9c9233141b00 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-2123478724"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '215', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f010f28e-0c80-4694-b24e-9c9233141b00', 'x-compute-request-id': 'req-f010f28e-0c80-4694-b24e-9c9233141b00', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3378, "name": "tempest-AggregatesRbacTest-aggregate-2123478724", "created_at": "2020-12-05T13:23:44.154317", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.171 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:44.217 38 INFO tempest.lib.common.rest_client [req-0df2bc43-420f-4b6d-9df0-048f1ffd2b57 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.099s 2020-12-05 13:23:44.217 38 DEBUG tempest.lib.common.rest_client [req-0df2bc43-420f-4b6d-9df0-048f1ffd2b57 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0df2bc43-420f-4b6d-9df0-048f1ffd2b57', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.229 40 INFO tempest.lib.common.rest_client [req-97a29108-9ae2-4bfc-b86e-bceb4dd4d365 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.057s 2020-12-05 13:23:44.229 40 DEBUG tempest.lib.common.rest_client [req-97a29108-9ae2-4bfc-b86e-bceb4dd4d365 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97a29108-9ae2-4bfc-b86e-bceb4dd4d365', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.264 40 INFO tempest.lib.common.rest_client [req-22bef4df-8d61-4870-a35b-eb35d56521a3 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:44.265 40 DEBUG tempest.lib.common.rest_client [req-22bef4df-8d61-4870-a35b-eb35d56521a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-22bef4df-8d61-4870-a35b-eb35d56521a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["mdLVAorwTcWsjh-gSPhjDA"], "expires_at": "2020-12-05T14:23:44.000000Z", "issued_at": "2020-12-05T13:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.278 39 INFO tempest.lib.common.rest_client [req-28309291-e52e-491e-9638-4338c79bc3b2 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/53ab85a90fd54e8f9e87889175dee7bb 0.211s 2020-12-05 13:23:44.279 39 DEBUG tempest.lib.common.rest_client [req-28309291-e52e-491e-9638-4338c79bc3b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28309291-e52e-491e-9638-4338c79bc3b2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/53ab85a90fd54e8f9e87889175dee7bb'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.306 38 INFO tempest.lib.common.rest_client [req-024cea56-89aa-4ce4-ae28-f320dcbb478c ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:23:44.307 38 DEBUG tempest.lib.common.rest_client [req-024cea56-89aa-4ce4-ae28-f320dcbb478c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-024cea56-89aa-4ce4-ae28-f320dcbb478c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["Y2xJrbM4RvGgLAd0BI42OQ"], "expires_at": "2020-12-05T14:23:44.000000Z", "issued_at": "2020-12-05T13:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.367 39 INFO tempest.lib.common.rest_client [req-d4c55f80-5b73-453b-8183-59b3cf2fb5ab ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:44.368 39 DEBUG tempest.lib.common.rest_client [req-d4c55f80-5b73-453b-8183-59b3cf2fb5ab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d4c55f80-5b73-453b-8183-59b3cf2fb5ab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["2c9XGnWFRK2h21aBkmZXxA"], "expires_at": "2020-12-05T14:23:44.000000Z", "issued_at": "2020-12-05T13:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.454 40 INFO tempest.lib.common.rest_client [req-6ab30c53-1876-4594-9a94-d8ed8067eb62 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/compute/v2.1/os-aggregates/3378 0.188s 2020-12-05 13:23:44.454 40 DEBUG tempest.lib.common.rest_client [req-6ab30c53-1876-4594-9a94-d8ed8067eb62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '244', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6ab30c53-1876-4594-9a94-d8ed8067eb62', 'x-compute-request-id': 'req-6ab30c53-1876-4594-9a94-d8ed8067eb62', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3378'} Body: b'{"aggregate": {"id": 3378, "name": "tempest-AggregatesRbacTest-aggregate-2123478724", "hosts": [], "metadata": {}, "created_at": "2020-12-05T13:23:44.000000", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.460 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:44.512 40 INFO tempest.lib.common.rest_client [req-fef37bf5-c94a-4b95-93fb-667cd42e78e8 ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.051s 2020-12-05 13:23:44.512 40 DEBUG tempest.lib.common.rest_client [req-fef37bf5-c94a-4b95-93fb-667cd42e78e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fef37bf5-c94a-4b95-93fb-667cd42e78e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.605 40 INFO tempest.lib.common.rest_client [req-b176ad06-7d98-417d-ae13-78e766d4408b ] Request (AggregatesRbacTest:test_show_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-05 13:23:44.606 40 DEBUG tempest.lib.common.rest_client [req-b176ad06-7d98-417d-ae13-78e766d4408b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b176ad06-7d98-417d-ae13-78e766d4408b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["XAsnzlzXQZ6O-DqKxTwl4w"], "expires_at": "2020-12-05T14:23:44.000000Z", "issued_at": "2020-12-05T13:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.685 39 INFO tempest.lib.common.rest_client [req-4025b213-15c3-463f-81f7-ac7d95209745 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=16c6136a5101450b82f67f0e92e7a213&name=default 0.316s 2020-12-05 13:23:44.686 39 DEBUG tempest.lib.common.rest_client [req-4025b213-15c3-463f-81f7-ac7d95209745 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4025b213-15c3-463f-81f7-ac7d95209745', 'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=16c6136a5101450b82f67f0e92e7a213&name=default'} Body: b'{"security_groups": [{"id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "name": "default", "stateful": true, "tenant_id": "16c6136a5101450b82f67f0e92e7a213", "description": "Default security group", "security_group_rules": [{"id": "165920d5-ba45-4bbc-96ad-4c3fb268d235", "tenant_id": "16c6136a5101450b82f67f0e92e7a213", "security_group_id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "description": null, "tags": [], "created_at": "2020-12-05T13:23:44Z", "updated_at": "2020-12-05T13:23:44Z", "revision_number": 0, "project_id": "16c6136a5101450b82f67f0e92e7a213"}, {"id": "b0d69050-7f2c-4be7-a0ce-4e093d1276d0", "tenant_id": "16c6136a5101450b82f67f0e92e7a213", "security_group_id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "description": null, "tags": [], "created_at": "2020-12-05T13:23:44Z", "updated_at": "2020-12-05T13:23:44Z", "revision_number": 0, "project_id": "16c6136a5101450b82f67f0e92e7a213"}, {"id": "cd9bf459-aa03-4293-9283-18330cde3101", "tenant_id": "16c6136a5101450b82f67f0e92e7a213", "security_group_id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:44Z", "updated_at": "2020-12-05T13:23:44Z", "revision_number": 0, "project_id": "16c6136a5101450b82f67f0e92e7a213"}, {"id": "ef76c5cd-8a1f-4207-be69-93a622d39b7a", "tenant_id": "16c6136a5101450b82f67f0e92e7a213", "security_group_id": "6f9408e1-bffb-493e-b8a7-c6c49809b3ec", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:44Z", "updated_at": "2020-12-05T13:23:44Z", "revision_number": 0, "project_id": "16c6136a5101450b82f67f0e92e7a213"}], "tags": [], "created_at": "2020-12-05T13:23:44Z", "updated_at": "2020-12-05T13:23:44Z", "revision_number": 1, "project_id": "16c6136a5101450b82f67f0e92e7a213"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.817 39 INFO tempest.lib.common.rest_client [req-e6afe734-7bc2-408a-ad07-100a1a9cc405 ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/6f9408e1-bffb-493e-b8a7-c6c49809b3ec 0.130s 2020-12-05 13:23:44.818 39 DEBUG tempest.lib.common.rest_client [req-e6afe734-7bc2-408a-ad07-100a1a9cc405 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e6afe734-7bc2-408a-ad07-100a1a9cc405', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/6f9408e1-bffb-493e-b8a7-c6c49809b3ec'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.823 40 INFO tempest.lib.common.rest_client [req-284726e5-c714-4742-a271-2646046848c1 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3378 0.216s 2020-12-05 13:23:44.824 40 DEBUG tempest.lib.common.rest_client [req-284726e5-c714-4742-a271-2646046848c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-284726e5-c714-4742-a271-2646046848c1', 'x-compute-request-id': 'req-284726e5-c714-4742-a271-2646046848c1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3378'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.829 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:44.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.830 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.831 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.832 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.833 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.834 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.835 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.836 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.837 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.838 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.839 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.840 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.841 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.842 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.843 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.844 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.845 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.846 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.847 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.848 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.849 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.850 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.851 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.851 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.852 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.853 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.854 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.855 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.855 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.856 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-aggregates:update, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:44.891 40 INFO tempest.lib.common.rest_client [req-05921367-d88c-445e-b37d-33b96e090fe0 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 POST http://172.30.13.94/compute/v2.1/os-aggregates 0.034s 2020-12-05 13:23:44.892 40 DEBUG tempest.lib.common.rest_client [req-05921367-d88c-445e-b37d-33b96e090fe0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-359454232"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '214', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-05921367-d88c-445e-b37d-33b96e090fe0', 'x-compute-request-id': 'req-05921367-d88c-445e-b37d-33b96e090fe0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates'} Body: b'{"aggregate": {"id": 3379, "name": "tempest-AggregatesRbacTest-aggregate-359454232", "created_at": "2020-12-05T13:23:44.880463", "updated_at": null, "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.896 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:44.932 38 INFO tempest.lib.common.rest_client [req-dd4f8086-686d-47c9-9eb6-f16828908a3b ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 PUT http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.624s 2020-12-05 13:23:44.933 38 DEBUG tempest.lib.common.rest_client [req-dd4f8086-686d-47c9-9eb6-f16828908a3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"meta": {"foo": "bar"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '24', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-dd4f8086-686d-47c9-9eb6-f16828908a3b', 'x-compute-request-id': 'req-dd4f8086-686d-47c9-9eb6-f16828908a3b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'{"meta": {"foo": "bar"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.935 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:44.992 38 INFO tempest.lib.common.rest_client [req-add88d17-7d40-44c7-933d-8705d8587856 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 200 GET http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles 0.055s 2020-12-05 13:23:44.992 38 DEBUG tempest.lib.common.rest_client [req-add88d17-7d40-44c7-933d-8705d8587856 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-add88d17-7d40-44c7-933d-8705d8587856', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2/users/d51bb5edbd1c4b7c84c4f13df505322d/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.993 41 INFO tempest.lib.common.rest_client [req-2444bdf9-4bf4-421e-a588-2618f9754e7b ] Request (FlavorManageRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:23:44.994 41 DEBUG tempest.lib.common.rest_client [req-2444bdf9-4bf4-421e-a588-2618f9754e7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2444bdf9-4bf4-421e-a588-2618f9754e7b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "password_expires_at": null}, "audit_ids": ["Uh9wKQgESb6zxoiPLst-KA"], "expires_at": "2020-12-05T14:23:44.000000Z", "issued_at": "2020-12-05T13:23:44.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:44.996 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:44.997 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.998 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.998 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.999 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.999 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:44.999 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.000 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.000 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.001 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.001 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.001 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.002 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.002 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.002 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.003 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.003 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.003 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.004 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.004 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.005 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.005 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.006 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.006 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.006 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.007 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.007 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.007 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.008 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.008 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.008 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.008 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.009 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.009 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.009 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.010 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.010 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.010 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.010 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.011 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.011 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.011 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.012 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.012 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.012 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.012 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.013 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.013 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.013 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.014 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.014 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.014 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.014 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.014 39 INFO tempest.lib.common.rest_client [req-f970df6d-1499-4595-9701-0dfe382d6dab ] Request (NovaAvailabilityZoneRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213 0.195s 2020-12-05 13:23:45.015 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.015 39 DEBUG tempest.lib.common.rest_client [req-f970df6d-1499-4595-9701-0dfe382d6dab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f970df6d-1499-4595-9701-0dfe382d6dab', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/16c6136a5101450b82f67f0e92e7a213'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.015 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.015 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.016 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.016 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.016 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.016 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.017 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.017 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.018 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.018 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.018 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.018 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.019 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.019 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.019 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.020 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.020 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.020 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.020 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.021 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.021 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.021 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.022 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-manage:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:45.022 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:45.049 39 INFO tempest.lib.common.rest_client [req-07eeee8b-44b6-4ae2-8c2f-767ebc76b730 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.030s 2020-12-05 13:23:45.049 39 DEBUG tempest.lib.common.rest_client [req-07eeee8b-44b6-4ae2-8c2f-767ebc76b730 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-07eeee8b-44b6-4ae2-8c2f-767ebc76b730', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["krQbeygSRx6BiHoe05RL_A"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.065 38 INFO tempest.lib.common.rest_client [req-ec21e91f-bf42-44b5-84be-3bf4fe969ee2 ] Request (ImagesMetadataRbacTest:test_update_image_metadata_item): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.071s 2020-12-05 13:23:45.065 38 DEBUG tempest.lib.common.rest_client [req-ec21e91f-bf42-44b5-84be-3bf4fe969ee2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6634', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec21e91f-bf42-44b5-84be-3bf4fe969ee2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d51bb5edbd1c4b7c84c4f13df505322d", "name": "tempest-ImagesMetadataRbacTest-906139197", "password_expires_at": null}, "audit_ids": ["ihgQknytTzywZLrIIsQfXA"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "929d836cca034597b6b7e7567529d2b2", "name": "tempest-ImagesMetadataRbacTest-906139197"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_929d836cca034597b6b7e7567529d2b2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "int _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.078 40 INFO tempest.lib.common.rest_client [req-0076e87d-0aac-4135-a737-ba2ce9f8c32f ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.181s 2020-12-05 13:23:45.078 40 DEBUG tempest.lib.common.rest_client [req-0076e87d-0aac-4135-a737-ba2ce9f8c32f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:44 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0076e87d-0aac-4135-a737-ba2ce9f8c32f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.089 39 INFO tempest.lib.common.rest_client [req-374b62c8-82ac-42d3-a614-e0af9fb45dc8 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:45.090 39 DEBUG tempest.lib.common.rest_client [req-374b62c8-82ac-42d3-a614-e0af9fb45dc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-374b62c8-82ac-42d3-a614-e0af9fb45dc8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["mXscrsjeQdK4kfYdjvnAbQ"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.123 41 INFO tempest.lib.common.rest_client [req-93cd0f22-79af-4de6-bbdf-251cd96f2db4 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles 0.100s 2020-12-05 13:23:45.124 41 DEBUG tempest.lib.common.rest_client [req-93cd0f22-79af-4de6-bbdf-251cd96f2db4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93cd0f22-79af-4de6-bbdf-251cd96f2db4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.139 39 INFO tempest.lib.common.rest_client [req-384f3cac-49a2-43ae-8e73-aa5d25a1a08e ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-12-05 13:23:45.139 39 DEBUG tempest.lib.common.rest_client [req-384f3cac-49a2-43ae-8e73-aa5d25a1a08e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-384f3cac-49a2-43ae-8e73-aa5d25a1a08e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.160 40 INFO tempest.lib.common.rest_client [req-9e79f5a7-d1d3-4622-bae6-d04a236ad693 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:45.160 40 DEBUG tempest.lib.common.rest_client [req-9e79f5a7-d1d3-4622-bae6-d04a236ad693 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9e79f5a7-d1d3-4622-bae6-d04a236ad693', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["OPIJkHoQQi-RpRDEcnHJ3A"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.204 41 INFO tempest.lib.common.rest_client [req-76bcc453-9cc3-4a08-9d09-63022f0b2aa6 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:23:45.205 41 DEBUG tempest.lib.common.rest_client [req-76bcc453-9cc3-4a08-9d09-63022f0b2aa6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76bcc453-9cc3-4a08-9d09-63022f0b2aa6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "password_expires_at": null}, "audit_ids": ["_fy5kwX3SXi10wKZvj2BHw"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.219 39 INFO tempest.lib.common.rest_client [req-2b507bdd-29ae-48ae-badd-c9a5637a3b6a ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-05 13:23:45.219 39 DEBUG tempest.lib.common.rest_client [req-2b507bdd-29ae-48ae-badd-c9a5637a3b6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HostsRbacTest-1139301709-desc", "domain_id": "default", "name": "tempest-HostsRbacTest-1139301709"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b507bdd-29ae-48ae-badd-c9a5637a3b6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709", "domain_id": "default", "description": "tempest-HostsRbacTest-1139301709-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.266 40 INFO tempest.lib.common.rest_client [req-2d14ce7d-509e-4644-bfdc-042cb2f77d82 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 PUT http://172.30.13.94/compute/v2.1/os-aggregates/3379 0.104s 2020-12-05 13:23:45.267 40 DEBUG tempest.lib.common.rest_client [req-2d14ce7d-509e-4644-bfdc-042cb2f77d82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"aggregate": {"name": "tempest-AggregatesRbacTest-aggregate-1936965799"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '268', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2d14ce7d-509e-4644-bfdc-042cb2f77d82', 'x-compute-request-id': 'req-2d14ce7d-509e-4644-bfdc-042cb2f77d82', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3379'} Body: b'{"aggregate": {"id": 3379, "name": "tempest-AggregatesRbacTest-aggregate-1936965799", "hosts": [], "metadata": {}, "created_at": "2020-12-05T13:23:45.000000", "updated_at": "2020-12-05T13:23:45.252669", "deleted_at": null, "deleted": false, "availability_zone": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.271 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:45.327 39 INFO tempest.lib.common.rest_client [req-106c7e5e-39a5-4a46-8fb6-c6118c9c9f0c ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-12-05 13:23:45.327 39 DEBUG tempest.lib.common.rest_client [req-106c7e5e-39a5-4a46-8fb6-c6118c9c9f0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HostsRbacTest-1139301709", "password": "Z0_PPY%#xiT=7+*", "project_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "email": "tempest-HostsRbacTest-1492120313@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-106c7e5e-39a5-4a46-8fb6-c6118c9c9f0c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "email": "tempest-HostsRbacTest-1492120313@example.com", "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/b2d538baa6e049cfa31ecd0d5d41ec86"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.380 40 INFO tempest.lib.common.rest_client [req-3a752d6c-20e0-4621-aadc-8829b50870b4 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 200 GET http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles 0.108s 2020-12-05 13:23:45.380 40 DEBUG tempest.lib.common.rest_client [req-3a752d6c-20e0-4621-aadc-8829b50870b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a752d6c-20e0-4621-aadc-8829b50870b4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef/users/6d140358d164458ab6f7be3edc1f990a/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.405 41 INFO tempest.lib.common.rest_client [req-f2950f15-51ed-4ac0-b6b0-0dbf341f5755 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.199s 2020-12-05 13:23:45.405 41 DEBUG tempest.lib.common.rest_client [req-f2950f15-51ed-4ac0-b6b0-0dbf341f5755 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorManageRbacTest-flavor-161573829", "ram": 7, "vcpus": 3, "disk": 6, "id": "ddd5e775-a850-463e-af04-07abff5baa7f"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '505', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f2950f15-51ed-4ac0-b6b0-0dbf341f5755', 'x-compute-request-id': 'req-f2950f15-51ed-4ac0-b6b0-0dbf341f5755', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "ddd5e775-a850-463e-af04-07abff5baa7f", "name": "tempest-FlavorManageRbacTest-flavor-161573829", "ram": 7, "disk": 6, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 3, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/ddd5e775-a850-463e-af04-07abff5baa7f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/ddd5e775-a850-463e-af04-07abff5baa7f"}]}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.412 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:45.432 39 INFO tempest.lib.common.rest_client [req-908c365e-1bdb-41ce-b8c2-6b408287886d ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-12-05 13:23:45.432 39 DEBUG tempest.lib.common.rest_client [req-908c365e-1bdb-41ce-b8c2-6b408287886d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-908c365e-1bdb-41ce-b8c2-6b408287886d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.463 41 INFO tempest.lib.common.rest_client [req-52efebcf-1a75-4db3-a6fc-87267df8828c ] Request (FlavorManageRbacTest:test_create_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles 0.050s 2020-12-05 13:23:45.463 41 DEBUG tempest.lib.common.rest_client [req-52efebcf-1a75-4db3-a6fc-87267df8828c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52efebcf-1a75-4db3-a6fc-87267df8828c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.466 38 INFO tempest.lib.common.rest_client [req-cd3c302f-7dd8-4ee4-b903-a7f9acc871f6 ] Request (ImagesMetadataRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo 0.399s 2020-12-05 13:23:45.467 38 DEBUG tempest.lib.common.rest_client [req-cd3c302f-7dd8-4ee4-b903-a7f9acc871f6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cd3c302f-7dd8-4ee4-b903-a7f9acc871f6', 'x-compute-request-id': 'req-cd3c302f-7dd8-4ee4-b903-a7f9acc871f6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/de96ac53-094d-493d-8d81-62dc3598378e/metadata/foo'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.469 40 INFO tempest.lib.common.rest_client [req-c9d6383c-903c-4faf-bbf1-c507783e1f23 ] Request (AggregatesRbacTest:test_update_aggregate_rbac): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:23:45.470 40 DEBUG tempest.lib.common.rest_client [req-c9d6383c-903c-4faf-bbf1-c507783e1f23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c9d6383c-903c-4faf-bbf1-c507783e1f23', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "6d140358d164458ab6f7be3edc1f990a", "name": "tempest-AggregatesRbacTest-2048764523", "password_expires_at": null}, "audit_ids": ["q-mRivpET_upFaBY6rc18g"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "b1a94d6526274eb5b6f9a275c01b4cef", "name": "tempest-AggregatesRbacTest-2048764523"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_b1a94d6526274eb5b6f9a275c01b4cef", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.481 39 INFO tempest.lib.common.rest_client [req-c24758ef-809b-42d0-9df2-4a1dd2f0933f ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-12-05 13:23:45.481 39 DEBUG tempest.lib.common.rest_client [req-c24758ef-809b-42d0-9df2-4a1dd2f0933f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c24758ef-809b-42d0-9df2-4a1dd2f0933f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.534 41 INFO tempest.lib.common.rest_client [req-98e9906d-e0ec-4a2d-8a29-0ae36071c131 ] Request (FlavorManageRbacTest:test_create_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.070s 2020-12-05 13:23:45.535 41 DEBUG tempest.lib.common.rest_client [req-98e9906d-e0ec-4a2d-8a29-0ae36071c131 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-98e9906d-e0ec-4a2d-8a29-0ae36071c131', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "password_expires_at": null}, "audit_ids": ["pUX7Wx3TSw2Hr64ffjybYQ"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.538 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:45.539 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.540 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.540 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.541 38 INFO tempest.lib.common.rest_client [req-c981c9a9-c9a4-4f65-b26c-9ae09bdc0588 ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/de96ac53-094d-493d-8d81-62dc3598378e 0.072s 2020-12-05 13:23:45.541 38 DEBUG tempest.lib.common.rest_client [req-c981c9a9-c9a4-4f65-b26c-9ae09bdc0588 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-c981c9a9-c9a4-4f65-b26c-9ae09bdc0588', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/de96ac53-094d-493d-8d81-62dc3598378e'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.541 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.541 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.542 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.543 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.543 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.543 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.544 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.544 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.545 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.545 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.546 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.546 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.547 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.547 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.547 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.548 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.548 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.549 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.549 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.549 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.550 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.550 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.550 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.550 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.551 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.551 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.551 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.552 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.552 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.552 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.552 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.553 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.553 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.553 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.553 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.554 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.554 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.554 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.555 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.554 39 INFO tempest.lib.common.rest_client [req-e543ece5-c25f-4407-983b-68aa9795f662 ] Request (HostsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles/72a4576c553448cd941b052c1ca0cf2d 0.072s 2020-12-05 13:23:45.555 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.555 39 DEBUG tempest.lib.common.rest_client [req-e543ece5-c25f-4407-983b-68aa9795f662 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e543ece5-c25f-4407-983b-68aa9795f662', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.555 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.555 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.555 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HostsRbacTest-1139301709', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5dc28a8adb8b47a3b873ac6da0e0971c', 'project_name': 'tempest-HostsRbacTest-1139301709', 'tenant_id': '5dc28a8adb8b47a3b873ac6da0e0971c', 'tenant_name': 'tempest-HostsRbacTest-1139301709', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b2d538baa6e049cfa31ecd0d5d41ec86'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:45.556 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.556 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HostsRbacTest-1139301709', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '5dc28a8adb8b47a3b873ac6da0e0971c', 'project_name': 'tempest-HostsRbacTest-1139301709', 'tenant_id': '5dc28a8adb8b47a3b873ac6da0e0971c', 'tenant_name': 'tempest-HostsRbacTest-1139301709', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'b2d538baa6e049cfa31ecd0d5d41ec86'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:45.556 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.556 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.557 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.557 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.557 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.557 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.558 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.558 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.558 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.559 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.559 38 INFO tempest.lib.common.rest_client [req-c1b1e109-e518-4efb-ba90-35a4d2f12bf3 ] Request (ImagesMetadataRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/de96ac53-094d-493d-8d81-62dc3598378e 0.017s 2020-12-05 13:23:45.559 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.559 38 DEBUG tempest.lib.common.rest_client [req-c1b1e109-e518-4efb-ba90-35a4d2f12bf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-c1b1e109-e518-4efb-ba90-35a4d2f12bf3', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/de96ac53-094d-493d-8d81-62dc3598378e'} Body: b'{"message": "No image found with ID de96ac53-094d-493d-8d81-62dc3598378e

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.559 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.559 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.560 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.560 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.561 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.561 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.561 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.561 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.562 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.562 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.562 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.563 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.563 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.563 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.563 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.564 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.564 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.564 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:45.565 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-manage:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:45.659 39 INFO tempest.lib.common.rest_client [req-5a87a51b-ad57-4417-a82b-9606ff4b0608 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-05 13:23:45.659 39 DEBUG tempest.lib.common.rest_client [req-5a87a51b-ad57-4417-a82b-9606ff4b0608 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5a87a51b-ad57-4417-a82b-9606ff4b0608', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "password_expires_at": null}, "audit_ids": ["tQ1oCem0S_WgXrvd-vU43Q"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.757 39 INFO tempest.lib.common.rest_client [req-1f992dc7-45b6-4099-bfb0-1f56719b7017 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-05 13:23:45.758 39 DEBUG tempest.lib.common.rest_client [req-1f992dc7-45b6-4099-bfb0-1f56719b7017 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f992dc7-45b6-4099-bfb0-1f56719b7017', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["iUIB6CvKR7SPNL5G0NRciw"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.758 40 INFO tempest.lib.common.rest_client [req-cee00aff-db27-4838-8026-a6954a62dd15 ] Request (AggregatesRbacTest:_run_cleanups): 200 DELETE http://172.30.13.94/compute/v2.1/os-aggregates/3379 0.287s 2020-12-05 13:23:45.759 40 DEBUG tempest.lib.common.rest_client [req-cee00aff-db27-4838-8026-a6954a62dd15 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-cee00aff-db27-4838-8026-a6954a62dd15', 'x-compute-request-id': 'req-cee00aff-db27-4838-8026-a6954a62dd15', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-aggregates/3379'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.763 38 INFO tempest.lib.common.rest_client [req-9417f830-2871-4bcb-8560-095789ffb3a7 ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d51bb5edbd1c4b7c84c4f13df505322d 0.203s 2020-12-05 13:23:45.763 38 DEBUG tempest.lib.common.rest_client [req-9417f830-2871-4bcb-8560-095789ffb3a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9417f830-2871-4bcb-8560-095789ffb3a7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d51bb5edbd1c4b7c84c4f13df505322d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.789 41 INFO tempest.lib.common.rest_client [req-b02487d6-3af9-4e67-b4ab-5fab99a41a43 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.223s 2020-12-05 13:23:45.790 41 DEBUG tempest.lib.common.rest_client [req-b02487d6-3af9-4e67-b4ab-5fab99a41a43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorManageRbacTest-flavor-1502087770", "ram": 1, "vcpus": 6, "disk": 3, "id": "cc904760-40e1-4c32-8724-57c9c55008ad"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '506', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-b02487d6-3af9-4e67-b4ab-5fab99a41a43', 'x-compute-request-id': 'req-b02487d6-3af9-4e67-b4ab-5fab99a41a43', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "cc904760-40e1-4c32-8724-57c9c55008ad", "name": "tempest-FlavorManageRbacTest-flavor-1502087770", "ram": 1, "disk": 3, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 6, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/cc904760-40e1-4c32-8724-57c9c55008ad"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/cc904760-40e1-4c32-8724-57c9c55008ad"}]}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.796 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:45.837 38 INFO tempest.lib.common.rest_client [req-2537d6fb-1a52-4a72-955d-2955d6c410fe ] Request (ImagesMetadataRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.073s 2020-12-05 13:23:45.838 38 DEBUG tempest.lib.common.rest_client [req-2537d6fb-1a52-4a72-955d-2955d6c410fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2537d6fb-1a52-4a72-955d-2955d6c410fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["sJSuyOZSRwCDaNZhgxzW5A"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.860 39 INFO tempest.lib.common.rest_client [req-04ef2af6-e3d5-4b6c-8cbe-cbd896827b09 ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:45.860 39 DEBUG tempest.lib.common.rest_client [req-04ef2af6-e3d5-4b6c-8cbe-cbd896827b09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-04ef2af6-e3d5-4b6c-8cbe-cbd896827b09', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["xDsurveoRUGR8fQCHxsM3g"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.897 39 INFO tempest.lib.common.rest_client [req-d79c0127-c826-4832-b60f-65fef8b157ec ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.036s 2020-12-05 13:23:45.898 39 DEBUG tempest.lib.common.rest_client [req-d79c0127-c826-4832-b60f-65fef8b157ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d79c0127-c826-4832-b60f-65fef8b157ec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.903 41 INFO tempest.lib.common.rest_client [req-150a30cf-d311-4372-94ad-15e04713bca9 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles 0.107s 2020-12-05 13:23:45.904 41 DEBUG tempest.lib.common.rest_client [req-150a30cf-d311-4372-94ad-15e04713bca9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-150a30cf-d311-4372-94ad-15e04713bca9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.934 39 INFO tempest.lib.common.rest_client [req-e9700b35-46d9-4d52-935b-8cf7a6351184 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.035s 2020-12-05 13:23:45.935 39 DEBUG tempest.lib.common.rest_client [req-e9700b35-46d9-4d52-935b-8cf7a6351184 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9700b35-46d9-4d52-935b-8cf7a6351184', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.935 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:45.935 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:45.954 40 INFO tempest.lib.common.rest_client [req-2738dca0-aab8-4537-a198-8a4f2a4a2e8b ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/6d140358d164458ab6f7be3edc1f990a 0.191s 2020-12-05 13:23:45.955 40 DEBUG tempest.lib.common.rest_client [req-2738dca0-aab8-4537-a198-8a4f2a4a2e8b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2738dca0-aab8-4537-a198-8a4f2a4a2e8b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/6d140358d164458ab6f7be3edc1f990a'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:45.982 41 INFO tempest.lib.common.rest_client [req-34598a5a-09e5-4bb5-9e1e-68a32820c6e1 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:23:45.982 41 DEBUG tempest.lib.common.rest_client [req-34598a5a-09e5-4bb5-9e1e-68a32820c6e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34598a5a-09e5-4bb5-9e1e-68a32820c6e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "password_expires_at": null}, "audit_ids": ["sbUUr8FkQM-XVwf-s1N_nw"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.035 40 INFO tempest.lib.common.rest_client [req-06874027-b43c-4f3a-865b-3f12c2e09d93 ] Request (AggregatesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:23:46.036 40 DEBUG tempest.lib.common.rest_client [req-06874027-b43c-4f3a-865b-3f12c2e09d93 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-06874027-b43c-4f3a-865b-3f12c2e09d93', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["ZlFb3KfuTkuiFnLgWv1j7Q"], "expires_at": "2020-12-05T14:23:45.000000Z", "issued_at": "2020-12-05T13:23:45.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.041 39 INFO tempest.lib.common.rest_client [req-be72d8a0-d351-4c65-9f6e-034030e82707 ] Request (HostsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles 0.105s 2020-12-05 13:23:46.042 39 DEBUG tempest.lib.common.rest_client [req-be72d8a0-d351-4c65-9f6e-034030e82707 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be72d8a0-d351-4c65-9f6e-034030e82707', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.142 38 INFO tempest.lib.common.rest_client [req-579bbd64-54f8-4848-a524-6a51ce945a45 ] Request (ImagesMetadataRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=929d836cca034597b6b7e7567529d2b2&name=default 0.303s 2020-12-05 13:23:46.143 38 DEBUG tempest.lib.common.rest_client [req-579bbd64-54f8-4848-a524-6a51ce945a45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-579bbd64-54f8-4848-a524-6a51ce945a45', 'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=929d836cca034597b6b7e7567529d2b2&name=default'} Body: b'{"security_groups": [{"id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "name": "default", "stateful": true, "tenant_id": "929d836cca034597b6b7e7567529d2b2", "description": "Default security group", "security_group_rules": [{"id": "2c59ad7b-940f-4001-b2db-30d23da6acee", "tenant_id": "929d836cca034597b6b7e7567529d2b2", "security_group_id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "929d836cca034597b6b7e7567529d2b2"}, {"id": "30a7df10-40bc-4fa6-ad93-39c5cc31ec4a", "tenant_id": "929d836cca034597b6b7e7567529d2b2", "security_group_id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "929d836cca034597b6b7e7567529d2b2"}, {"id": "34a6eb74-bab4-4a29-bb19-872c49371cd4", "tenant_id": "929d836cca034597b6b7e7567529d2b2", "security_group_id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "929d836cca034597b6b7e7567529d2b2"}, {"id": "b704f588-e838-428a-959a-4e1e54930029", "tenant_id": "929d836cca034597b6b7e7567529d2b2", "security_group_id": "c9604a9d-6ecb-42d0-a1f3-19928c960546", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "929d836cca034597b6b7e7567529d2b2"}], "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 1, "project_id": "929d836cca034597b6b7e7567529d2b2"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.148 39 INFO tempest.lib.common.rest_client [req-6cb07b26-2f78-40ad-a9cd-faca9c89ff34 ] Request (HostsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles/72a4576c553448cd941b052c1ca0cf2d 0.105s 2020-12-05 13:23:46.149 39 DEBUG tempest.lib.common.rest_client [req-6cb07b26-2f78-40ad-a9cd-faca9c89ff34 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6cb07b26-2f78-40ad-a9cd-faca9c89ff34', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.259 39 INFO tempest.lib.common.rest_client [req-277c8af5-a1bb-4d74-8212-fb64c20c883d ] Request (HostsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles/a629c95d64b3416fb80ae90af4f69c05 0.109s 2020-12-05 13:23:46.259 39 DEBUG tempest.lib.common.rest_client [req-277c8af5-a1bb-4d74-8212-fb64c20c883d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-277c8af5-a1bb-4d74-8212-fb64c20c883d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.264 41 INFO tempest.lib.common.rest_client [req-704bbd87-07c1-485d-b502-4d8bcad90f83 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/cc904760-40e1-4c32-8724-57c9c55008ad 0.280s 2020-12-05 13:23:46.264 41 DEBUG tempest.lib.common.rest_client [req-704bbd87-07c1-485d-b502-4d8bcad90f83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:45 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-704bbd87-07c1-485d-b502-4d8bcad90f83', 'x-compute-request-id': 'req-704bbd87-07c1-485d-b502-4d8bcad90f83', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/cc904760-40e1-4c32-8724-57c9c55008ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.265 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:46.300 38 INFO tempest.lib.common.rest_client [req-e987f657-01ce-4c3e-9542-267b49dc8362 ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/c9604a9d-6ecb-42d0-a1f3-19928c960546 0.157s 2020-12-05 13:23:46.301 38 DEBUG tempest.lib.common.rest_client [req-e987f657-01ce-4c3e-9542-267b49dc8362 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-e987f657-01ce-4c3e-9542-267b49dc8362', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/c9604a9d-6ecb-42d0-a1f3-19928c960546'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.322 40 INFO tempest.lib.common.rest_client [req-dc3618ea-e712-4370-9f5e-dd0e24c4dce0 ] Request (AggregatesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b1a94d6526274eb5b6f9a275c01b4cef&name=default 0.285s 2020-12-05 13:23:46.323 40 DEBUG tempest.lib.common.rest_client [req-dc3618ea-e712-4370-9f5e-dd0e24c4dce0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-dc3618ea-e712-4370-9f5e-dd0e24c4dce0', 'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=b1a94d6526274eb5b6f9a275c01b4cef&name=default'} Body: b'{"security_groups": [{"id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "name": "default", "stateful": true, "tenant_id": "b1a94d6526274eb5b6f9a275c01b4cef", "description": "Default security group", "security_group_rules": [{"id": "91ccbae5-530a-4d27-a66e-599452e346f3", "tenant_id": "b1a94d6526274eb5b6f9a275c01b4cef", "security_group_id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "b1a94d6526274eb5b6f9a275c01b4cef"}, {"id": "df365ec8-2e62-424f-976f-9899a13e400b", "tenant_id": "b1a94d6526274eb5b6f9a275c01b4cef", "security_group_id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "b1a94d6526274eb5b6f9a275c01b4cef"}, {"id": "f5604fb2-4d84-456c-a5f9-e3feb5f4eb9c", "tenant_id": "b1a94d6526274eb5b6f9a275c01b4cef", "security_group_id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "b1a94d6526274eb5b6f9a275c01b4cef"}, {"id": "f6bfe078-6098-4cbb-8b7b-aafb0168bc07", "tenant_id": "b1a94d6526274eb5b6f9a275c01b4cef", "security_group_id": "e295e081-36ee-40f3-9ac5-33f226afa59c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 0, "project_id": "b1a94d6526274eb5b6f9a275c01b4cef"}], "tags": [], "created_at": "2020-12-05T13:23:46Z", "updated_at": "2020-12-05T13:23:46Z", "revision_number": 1, "project_id": "b1a94d6526274eb5b6f9a275c01b4cef"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.364 41 INFO tempest.lib.common.rest_client [req-125aa272-a2be-48b8-b2ea-c03577f96bf5 ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles 0.097s 2020-12-05 13:23:46.364 41 DEBUG tempest.lib.common.rest_client [req-125aa272-a2be-48b8-b2ea-c03577f96bf5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-125aa272-a2be-48b8-b2ea-c03577f96bf5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec/users/c118d06dc8da4774b81b35d1ba81f088/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.442 41 INFO tempest.lib.common.rest_client [req-751128f8-1d56-460e-9efb-5261d0bf7b1c ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:46.443 41 DEBUG tempest.lib.common.rest_client [req-751128f8-1d56-460e-9efb-5261d0bf7b1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-751128f8-1d56-460e-9efb-5261d0bf7b1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "c118d06dc8da4774b81b35d1ba81f088", "name": "tempest-FlavorManageRbacTest-749141839", "password_expires_at": null}, "audit_ids": ["4ftTDMtRQ-6IFqpvLy69ew"], "expires_at": "2020-12-05T14:23:46.000000Z", "issued_at": "2020-12-05T13:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "a90d96e426864b36ba5c94e7289944ec", "name": "tempest-FlavorManageRbacTest-749141839"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_a90d96e426864b36ba5c94e7289944ec", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.463 38 INFO tempest.lib.common.rest_client [req-e89e04ed-1ab4-4634-b5a2-2231a55b367c ] Request (ImagesMetadataRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2 0.161s 2020-12-05 13:23:46.464 38 DEBUG tempest.lib.common.rest_client [req-e89e04ed-1ab4-4634-b5a2-2231a55b367c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e89e04ed-1ab4-4634-b5a2-2231a55b367c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/929d836cca034597b6b7e7567529d2b2'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.544 40 INFO tempest.lib.common.rest_client [req-3c725649-7781-4128-bc48-49b49354ef3b ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/e295e081-36ee-40f3-9ac5-33f226afa59c 0.220s 2020-12-05 13:23:46.545 40 DEBUG tempest.lib.common.rest_client [req-3c725649-7781-4128-bc48-49b49354ef3b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3c725649-7781-4128-bc48-49b49354ef3b', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/e295e081-36ee-40f3-9ac5-33f226afa59c'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.562 38 INFO tempest.lib.common.rest_client [req-83015beb-d48e-4192-b6e6-5a158f7c034e ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-05 13:23:46.563 38 DEBUG tempest.lib.common.rest_client [req-83015beb-d48e-4192-b6e6-5a158f7c034e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83015beb-d48e-4192-b6e6-5a158f7c034e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["Nukzst7fRz-4vDLfTqQQ4w"], "expires_at": "2020-12-05T14:23:46.000000Z", "issued_at": "2020-12-05T13:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.653 38 INFO tempest.lib.common.rest_client [req-fcc190f8-37aa-4555-98b7-eebbae9b866f ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:46.654 38 DEBUG tempest.lib.common.rest_client [req-fcc190f8-37aa-4555-98b7-eebbae9b866f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fcc190f8-37aa-4555-98b7-eebbae9b866f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["FR4sfKQTSJirF9h5agQugQ"], "expires_at": "2020-12-05T14:23:46.000000Z", "issued_at": "2020-12-05T13:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.753 41 INFO tempest.lib.common.rest_client [req-4b3a4ebf-24d6-4e36-a131-a1166b42c0bf ] Request (FlavorManageRbacTest:test_delete_flavor_manage): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.308s 2020-12-05 13:23:46.753 41 DEBUG tempest.lib.common.rest_client [req-4b3a4ebf-24d6-4e36-a131-a1166b42c0bf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9270', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4b3a4ebf-24d6-4e36-a131-a1166b42c0bf', 'x-compute-request-id': 'req-4b3a4ebf-24d6-4e36-a131-a1166b42c0bf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "010a6385-3d37-479f-8924-349c195d1429", "name": "patrole_admin-flavor_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/010a6385-3d37-479f-8924-349c195d1429"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/010a6385-3d37-479f-8924-349c195d1429"}]}, {"id": "056424e1-8ec9-40e7-8c57-c819c5871f0e", "name": "patrole_admin-flavor_alt_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}]}, {"id": "05676930-0cf0-4112-96d5-c20d9d968784", "name": "tempest_slow-flavor_alt_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}]}, {"id": "0c1f2caa-cd64-454f-aac1-d85149f62f69", "name": "rally_verify_1bb95e6a_rwMloXB6", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.794 41 INFO tempest.lib.common.rest_client [req-729aa9ec-3cbe-4b24-95c4-78731328e8b2 ] Request (FlavorManageRbacTest:tearDownClass): 404 DELETE http://172.30.13.94/compute/v2.1/flavors/cc904760-40e1-4c32-8724-57c9c55008ad 0.020s 2020-12-05 13:23:46.794 41 DEBUG tempest.lib.common.rest_client [req-729aa9ec-3cbe-4b24-95c4-78731328e8b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '109', 'x-openstack-request-id': 'req-729aa9ec-3cbe-4b24-95c4-78731328e8b2', 'x-compute-request-id': 'req-729aa9ec-3cbe-4b24-95c4-78731328e8b2', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/cc904760-40e1-4c32-8724-57c9c55008ad'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor cc904760-40e1-4c32-8724-57c9c55008ad could not be found."}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.796 40 INFO tempest.lib.common.rest_client [req-b6f578e3-a9b0-4f3a-8154-75bac1b87c28 ] Request (AggregatesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef 0.250s 2020-12-05 13:23:46.796 40 DEBUG tempest.lib.common.rest_client [req-b6f578e3-a9b0-4f3a-8154-75bac1b87c28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6f578e3-a9b0-4f3a-8154-75bac1b87c28', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/b1a94d6526274eb5b6f9a275c01b4cef'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.809 38 INFO tempest.lib.common.rest_client [req-b3369355-dbec-4094-8119-9e1e2ab3ac14 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.154s 2020-12-05 13:23:46.809 38 DEBUG tempest.lib.common.rest_client [req-b3369355-dbec-4094-8119-9e1e2ab3ac14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3369355-dbec-4094-8119-9e1e2ab3ac14', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.835 41 INFO tempest.lib.common.rest_client [req-48034766-0959-4a05-a23e-46b4858e0888 ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.040s 2020-12-05 13:23:46.836 41 DEBUG tempest.lib.common.rest_client [req-48034766-0959-4a05-a23e-46b4858e0888 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9270', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-48034766-0959-4a05-a23e-46b4858e0888', 'x-compute-request-id': 'req-48034766-0959-4a05-a23e-46b4858e0888', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "010a6385-3d37-479f-8924-349c195d1429", "name": "patrole_admin-flavor_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/010a6385-3d37-479f-8924-349c195d1429"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/010a6385-3d37-479f-8924-349c195d1429"}]}, {"id": "056424e1-8ec9-40e7-8c57-c819c5871f0e", "name": "patrole_admin-flavor_alt_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}]}, {"id": "05676930-0cf0-4112-96d5-c20d9d968784", "name": "tempest_slow-flavor_alt_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}]}, {"id": "0c1f2caa-cd64-454f-aac1-d85149f62f69", "name": "rally_verify_1bb95e6a_rwMloXB6", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.884 40 INFO tempest.lib.common.rest_client [req-ba12a016-8e46-437a-b837-29db6986e5f4 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-05 13:23:46.884 40 DEBUG tempest.lib.common.rest_client [req-ba12a016-8e46-437a-b837-29db6986e5f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba12a016-8e46-437a-b837-29db6986e5f4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["PhJm-HvHQ2CfUHM5u7ICkQ"], "expires_at": "2020-12-05T14:23:46.000000Z", "issued_at": "2020-12-05T13:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.886 41 INFO tempest.lib.common.rest_client [req-55566588-e678-4e53-a916-b13c6dfc4e41 ] Request (FlavorManageRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/ddd5e775-a850-463e-af04-07abff5baa7f 0.035s 2020-12-05 13:23:46.886 41 DEBUG tempest.lib.common.rest_client [req-55566588-e678-4e53-a916-b13c6dfc4e41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-55566588-e678-4e53-a916-b13c6dfc4e41', 'x-compute-request-id': 'req-55566588-e678-4e53-a916-b13c6dfc4e41', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/ddd5e775-a850-463e-af04-07abff5baa7f'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.923 41 INFO tempest.lib.common.rest_client [req-870fe1fb-53cd-45c5-b405-0d9d19cf5021 ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.036s 2020-12-05 13:23:46.923 41 DEBUG tempest.lib.common.rest_client [req-870fe1fb-53cd-45c5-b405-0d9d19cf5021 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-870fe1fb-53cd-45c5-b405-0d9d19cf5021', 'x-compute-request-id': 'req-870fe1fb-53cd-45c5-b405-0d9d19cf5021', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "010a6385-3d37-479f-8924-349c195d1429", "name": "patrole_admin-flavor_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/010a6385-3d37-479f-8924-349c195d1429"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/010a6385-3d37-479f-8924-349c195d1429"}]}, {"id": "056424e1-8ec9-40e7-8c57-c819c5871f0e", "name": "patrole_admin-flavor_alt_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}]}, {"id": "05676930-0cf0-4112-96d5-c20d9d968784", "name": "tempest_slow-flavor_alt_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}]}, {"id": "0c1f2caa-cd64-454f-aac1-d85149f62f69", "name": "rally_verify_1bb95e6a_rwMloXB6", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.925 38 INFO tempest.lib.common.rest_client [req-c4e41124-d021-4a21-9d21-6f538d1478c1 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.115s 2020-12-05 13:23:46.926 38 DEBUG tempest.lib.common.rest_client [req-c4e41124-d021-4a21-9d21-6f538d1478c1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImagesRbacTest-508515993-desc", "domain_id": "default", "name": "tempest-ImagesRbacTest-508515993"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '364', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4e41124-d021-4a21-9d21-6f538d1478c1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993", "domain_id": "default", "description": "tempest-ImagesRbacTest-508515993-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:46.928 40 INFO tempest.lib.common.rest_client [req-a0530060-9f88-4d53-b5ba-ed114605943b ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:46.929 40 DEBUG tempest.lib.common.rest_client [req-a0530060-9f88-4d53-b5ba-ed114605943b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0530060-9f88-4d53-b5ba-ed114605943b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["YDRlJ1LGSAK8gLmoVKqz5A"], "expires_at": "2020-12-05T14:23:46.000000Z", "issued_at": "2020-12-05T13:23:46.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.026 38 INFO tempest.lib.common.rest_client [req-84a53fe4-f76a-4e60-a528-cd57832afd39 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.100s 2020-12-05 13:23:47.027 38 DEBUG tempest.lib.common.rest_client [req-84a53fe4-f76a-4e60-a528-cd57832afd39 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImagesRbacTest-508515993", "password": "O6=Mki+zCPH53VR", "project_id": "3043ec12e06e4cc88a69094be73f9dea", "email": "tempest-ImagesRbacTest-684898946@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-84a53fe4-f76a-4e60-a528-cd57832afd39', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "3043ec12e06e4cc88a69094be73f9dea", "email": "tempest-ImagesRbacTest-684898946@example.com", "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/3ad453ba4c73411594153bbbd96ac0ab"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.030 40 INFO tempest.lib.common.rest_client [req-5dcdcb97-4063-42c7-aea1-718231fb61d2 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.100s 2020-12-05 13:23:47.031 40 DEBUG tempest.lib.common.rest_client [req-5dcdcb97-4063-42c7-aea1-718231fb61d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5dcdcb97-4063-42c7-aea1-718231fb61d2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.076 38 INFO tempest.lib.common.rest_client [req-96711474-a1c7-4a7c-81b8-a441a19a9a96 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-12-05 13:23:47.076 38 DEBUG tempest.lib.common.rest_client [req-96711474-a1c7-4a7c-81b8-a441a19a9a96 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96711474-a1c7-4a7c-81b8-a441a19a9a96', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.093 40 INFO tempest.lib.common.rest_client [req-00420e46-de31-46ad-ac45-41df5abdf6fd ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.061s 2020-12-05 13:23:47.093 40 DEBUG tempest.lib.common.rest_client [req-00420e46-de31-46ad-ac45-41df5abdf6fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorAccessRbacTest-1935815641-desc", "domain_id": "default", "name": "tempest-FlavorAccessRbacTest-1935815641"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00420e46-de31-46ad-ac45-41df5abdf6fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641", "domain_id": "default", "description": "tempest-FlavorAccessRbacTest-1935815641-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.139 41 INFO tempest.lib.common.rest_client [req-fae78ad1-5f92-4e1a-9be3-8e7c1ef93046 ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/c118d06dc8da4774b81b35d1ba81f088 0.198s 2020-12-05 13:23:47.139 41 DEBUG tempest.lib.common.rest_client [req-fae78ad1-5f92-4e1a-9be3-8e7c1ef93046 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:46 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fae78ad1-5f92-4e1a-9be3-8e7c1ef93046', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/c118d06dc8da4774b81b35d1ba81f088'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.184 38 INFO tempest.lib.common.rest_client [req-c691884e-648d-46ac-86be-d6dd532a3345 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.106s 2020-12-05 13:23:47.184 38 DEBUG tempest.lib.common.rest_client [req-c691884e-648d-46ac-86be-d6dd532a3345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c691884e-648d-46ac-86be-d6dd532a3345', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.204 40 INFO tempest.lib.common.rest_client [req-a9fb1230-2e30-44a0-ad24-8a85b4decdfa ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-12-05 13:23:47.204 40 DEBUG tempest.lib.common.rest_client [req-a9fb1230-2e30-44a0-ad24-8a85b4decdfa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorAccessRbacTest-1935815641", "password": "V7~=^w@QLhAtF#P", "project_id": "21dadce4be4f4477a4724873bc2c6493", "email": "tempest-FlavorAccessRbacTest-1773962428@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '396', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9fb1230-2e30-44a0-ad24-8a85b4decdfa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "21dadce4be4f4477a4724873bc2c6493", "email": "tempest-FlavorAccessRbacTest-1773962428@example.com", "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/16debb40aeb247f884f17975ad785956"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.231 41 INFO tempest.lib.common.rest_client [req-99a30524-a889-4915-806f-36a864b63a2c ] Request (FlavorManageRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:47.231 41 DEBUG tempest.lib.common.rest_client [req-99a30524-a889-4915-806f-36a864b63a2c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99a30524-a889-4915-806f-36a864b63a2c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["14hOK3ohTBuwpWyOzlwKOw"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.299 38 INFO tempest.lib.common.rest_client [req-144b4281-7aa6-4b3c-af12-41fe0716062d ] Request (ImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles/72a4576c553448cd941b052c1ca0cf2d 0.113s 2020-12-05 13:23:47.299 38 DEBUG tempest.lib.common.rest_client [req-144b4281-7aa6-4b3c-af12-41fe0716062d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-144b4281-7aa6-4b3c-af12-41fe0716062d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.300 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesRbacTest-508515993', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3043ec12e06e4cc88a69094be73f9dea', 'project_name': 'tempest-ImagesRbacTest-508515993', 'tenant_id': '3043ec12e06e4cc88a69094be73f9dea', 'tenant_name': 'tempest-ImagesRbacTest-508515993', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3ad453ba4c73411594153bbbd96ac0ab'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:47.301 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImagesRbacTest-508515993', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '3043ec12e06e4cc88a69094be73f9dea', 'project_name': 'tempest-ImagesRbacTest-508515993', 'tenant_id': '3043ec12e06e4cc88a69094be73f9dea', 'tenant_name': 'tempest-ImagesRbacTest-508515993', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '3ad453ba4c73411594153bbbd96ac0ab'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:47.339 40 INFO tempest.lib.common.rest_client [req-cdf91c6b-d98f-4d7d-a90e-63732490d868 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.133s 2020-12-05 13:23:47.339 40 DEBUG tempest.lib.common.rest_client [req-cdf91c6b-d98f-4d7d-a90e-63732490d868 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cdf91c6b-d98f-4d7d-a90e-63732490d868', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.344 39 INFO tempest.lib.common.rest_client [req-05269001-29a1-4352-9778-b68ff6baab4c ] Request (HostsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:47.345 39 DEBUG tempest.lib.common.rest_client [req-05269001-29a1-4352-9778-b68ff6baab4c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-05269001-29a1-4352-9778-b68ff6baab4c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "password_expires_at": null}, "audit_ids": ["Nej5ZrsSQJiHe0Ds2j8KMA"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.348 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:47.349 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.349 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.350 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.351 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.351 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.351 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.352 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.352 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.352 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.353 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.353 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.353 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.353 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.354 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.354 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.354 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.355 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.355 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.355 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.356 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.356 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.356 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.356 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.357 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.357 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.357 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.358 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.358 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.358 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.358 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.359 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.359 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.359 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.359 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.360 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.360 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.360 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.361 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.361 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.361 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.362 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.362 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.362 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.362 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.363 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.363 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.363 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.364 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.364 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.364 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.364 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.365 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.365 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.365 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.366 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.366 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.366 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.366 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.367 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.367 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.368 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.368 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.368 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.368 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.369 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.369 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.369 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.370 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.371 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.371 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:47.372 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hosts:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:47.372 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:47.415 38 INFO tempest.lib.common.rest_client [req-3b91bf4c-b9e7-49cb-ab66-ae5301c1b5b1 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-05 13:23:47.415 38 DEBUG tempest.lib.common.rest_client [req-3b91bf4c-b9e7-49cb-ab66-ae5301c1b5b1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6557', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3b91bf4c-b9e7-49cb-ab66-ae5301c1b5b1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["lCMh8dfdSD20mQLyAVWpyQ"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/imag _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.444 40 INFO tempest.lib.common.rest_client [req-4d63646d-125e-4c95-99c0-727ff9cfdd40 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-12-05 13:23:47.445 40 DEBUG tempest.lib.common.rest_client [req-4d63646d-125e-4c95-99c0-727ff9cfdd40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d63646d-125e-4c95-99c0-727ff9cfdd40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.451 38 INFO tempest.lib.common.rest_client [req-060b93cd-a4bf-44c6-9279-aaa6b6328c3f ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:47.451 38 DEBUG tempest.lib.common.rest_client [req-060b93cd-a4bf-44c6-9279-aaa6b6328c3f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-060b93cd-a4bf-44c6-9279-aaa6b6328c3f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["8SJvymW0Q3yEIaUI6HRKNQ"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.481 39 INFO tempest.lib.common.rest_client [req-e9bd90a0-f013-487c-9173-4704e0232214 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles 0.108s 2020-12-05 13:23:47.482 39 DEBUG tempest.lib.common.rest_client [req-e9bd90a0-f013-487c-9173-4704e0232214 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9bd90a0-f013-487c-9173-4704e0232214', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.497 38 INFO tempest.lib.common.rest_client [req-baaa0b44-3466-487c-9be0-5e7949652b91 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:47.498 38 DEBUG tempest.lib.common.rest_client [req-baaa0b44-3466-487c-9be0-5e7949652b91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-baaa0b44-3466-487c-9be0-5e7949652b91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["OfOlgxHDS4eV2io7fUzRmw"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.512 40 INFO tempest.lib.common.rest_client [req-34648d9b-1462-4c91-9397-fffa78e16587 ] Request (FlavorAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-05 13:23:47.513 40 DEBUG tempest.lib.common.rest_client [req-34648d9b-1462-4c91-9397-fffa78e16587 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-34648d9b-1462-4c91-9397-fffa78e16587', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.513 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorAccessRbacTest-1935815641', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21dadce4be4f4477a4724873bc2c6493', 'project_name': 'tempest-FlavorAccessRbacTest-1935815641', 'tenant_id': '21dadce4be4f4477a4724873bc2c6493', 'tenant_name': 'tempest-FlavorAccessRbacTest-1935815641', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '16debb40aeb247f884f17975ad785956'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:47.514 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorAccessRbacTest-1935815641', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21dadce4be4f4477a4724873bc2c6493', 'project_name': 'tempest-FlavorAccessRbacTest-1935815641', 'tenant_id': '21dadce4be4f4477a4724873bc2c6493', 'tenant_name': 'tempest-FlavorAccessRbacTest-1935815641', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '16debb40aeb247f884f17975ad785956'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:47.563 39 INFO tempest.lib.common.rest_client [req-987f0eb1-a8b8-4157-acaa-d61ce24f1cf8 ] Request (HostsRbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:47.564 39 DEBUG tempest.lib.common.rest_client [req-987f0eb1-a8b8-4157-acaa-d61ce24f1cf8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-987f0eb1-a8b8-4157-acaa-d61ce24f1cf8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "password_expires_at": null}, "audit_ids": ["TxEcgK8rQ5q1bar78K1zMw"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.605 38 INFO tempest.lib.common.rest_client [req-f603f468-580a-4bd5-b319-7f218e64e8cb ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.106s 2020-12-05 13:23:47.605 38 DEBUG tempest.lib.common.rest_client [req-f603f468-580a-4bd5-b319-7f218e64e8cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f603f468-580a-4bd5-b319-7f218e64e8cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.615 41 INFO tempest.lib.common.rest_client [req-87a62386-d40d-4a40-b902-6bb49169900a ] Request (FlavorManageRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a90d96e426864b36ba5c94e7289944ec&name=default 0.382s 2020-12-05 13:23:47.615 41 DEBUG tempest.lib.common.rest_client [req-87a62386-d40d-4a40-b902-6bb49169900a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-87a62386-d40d-4a40-b902-6bb49169900a', 'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=a90d96e426864b36ba5c94e7289944ec&name=default'} Body: b'{"security_groups": [{"id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "name": "default", "stateful": true, "tenant_id": "a90d96e426864b36ba5c94e7289944ec", "description": "Default security group", "security_group_rules": [{"id": "39cdb997-39dd-47e1-b93a-d15a5836e1a3", "tenant_id": "a90d96e426864b36ba5c94e7289944ec", "security_group_id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:47Z", "updated_at": "2020-12-05T13:23:47Z", "revision_number": 0, "project_id": "a90d96e426864b36ba5c94e7289944ec"}, {"id": "463baec4-b9d6-489c-aec8-d0bbf8622309", "tenant_id": "a90d96e426864b36ba5c94e7289944ec", "security_group_id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "description": null, "tags": [], "created_at": "2020-12-05T13:23:47Z", "updated_at": "2020-12-05T13:23:47Z", "revision_number": 0, "project_id": "a90d96e426864b36ba5c94e7289944ec"}, {"id": "5d2ba59c-0deb-4da1-97b3-86da926e2fd7", "tenant_id": "a90d96e426864b36ba5c94e7289944ec", "security_group_id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "description": null, "tags": [], "created_at": "2020-12-05T13:23:47Z", "updated_at": "2020-12-05T13:23:47Z", "revision_number": 0, "project_id": "a90d96e426864b36ba5c94e7289944ec"}, {"id": "dea42eb2-0563-48bd-af18-8310da4c6e51", "tenant_id": "a90d96e426864b36ba5c94e7289944ec", "security_group_id": "8b0c0723-8dfb-479e-af67-b4d81532a0d7", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:47Z", "updated_at": "2020-12-05T13:23:47Z", "revision_number": 0, "project_id": "a90d96e426864b36ba5c94e7289944ec"}], "tags": [], "created_at": "2020-12-05T13:23:47Z", "updated_at": "2020-12-05T13:23:47Z", "revision_number": 1, "project_id": "a90d96e426864b36ba5c94e7289944ec"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.634 40 INFO tempest.lib.common.rest_client [req-8ecefb9b-d082-41c6-94e3-c63296397db6 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.110s 2020-12-05 13:23:47.635 40 DEBUG tempest.lib.common.rest_client [req-8ecefb9b-d082-41c6-94e3-c63296397db6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ecefb9b-d082-41c6-94e3-c63296397db6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["h5poKvM6Q2aHTnlxALqPiQ"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.650 38 INFO tempest.lib.common.rest_client [req-75909c85-f810-4077-bf92-9f2bfc917322 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-12-05 13:23:47.651 38 DEBUG tempest.lib.common.rest_client [req-75909c85-f810-4077-bf92-9f2bfc917322 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75909c85-f810-4077-bf92-9f2bfc917322', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.652 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:47.652 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:47.675 40 INFO tempest.lib.common.rest_client [req-2ae30123-b01b-4a1a-8441-fadac0a19569 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:47.675 40 DEBUG tempest.lib.common.rest_client [req-2ae30123-b01b-4a1a-8441-fadac0a19569 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ae30123-b01b-4a1a-8441-fadac0a19569', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["o4f9I5FpQ8q-Z_5z4Y14WQ"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.707 38 INFO tempest.lib.common.rest_client [req-b1ef59c5-d92f-465d-9e43-62d8a56232e0 ] Request (ImagesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.054s 2020-12-05 13:23:47.707 38 DEBUG tempest.lib.common.rest_client [req-b1ef59c5-d92f-465d-9e43-62d8a56232e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1ef59c5-d92f-465d-9e43-62d8a56232e0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.728 40 INFO tempest.lib.common.rest_client [req-1353c977-9f0d-4e0c-8f51-dc3c5415ae63 ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.044s 2020-12-05 13:23:47.729 40 DEBUG tempest.lib.common.rest_client [req-1353c977-9f0d-4e0c-8f51-dc3c5415ae63 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1353c977-9f0d-4e0c-8f51-dc3c5415ae63', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["H6DlVNhBQBmoerFQc2Vwjg"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.742 41 INFO tempest.lib.common.rest_client [req-643e39fd-3e76-4e30-beaa-c3933b839c33 ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/8b0c0723-8dfb-479e-af67-b4d81532a0d7 0.125s 2020-12-05 13:23:47.742 41 DEBUG tempest.lib.common.rest_client [req-643e39fd-3e76-4e30-beaa-c3933b839c33 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-643e39fd-3e76-4e30-beaa-c3933b839c33', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8b0c0723-8dfb-479e-af67-b4d81532a0d7'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.770 38 INFO tempest.lib.common.rest_client [req-25fbef51-035a-4ece-b33e-4419a5841dca ] Request (ImagesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-12-05 13:23:47.771 38 DEBUG tempest.lib.common.rest_client [req-25fbef51-035a-4ece-b33e-4419a5841dca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25fbef51-035a-4ece-b33e-4419a5841dca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.780 40 INFO tempest.lib.common.rest_client [req-2c067064-3a20-4b03-9e63-d902897f1bb1 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.050s 2020-12-05 13:23:47.781 40 DEBUG tempest.lib.common.rest_client [req-2c067064-3a20-4b03-9e63-d902897f1bb1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c067064-3a20-4b03-9e63-d902897f1bb1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.812 39 INFO tempest.lib.common.rest_client [req-07e6e3bf-8c06-42fd-a5e7-2c544a9fa0e3 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.246s 2020-12-05 13:23:47.812 39 DEBUG tempest.lib.common.rest_client [req-07e6e3bf-8c06-42fd-a5e7-2c544a9fa0e3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-07e6e3bf-8c06-42fd-a5e7-2c544a9fa0e3', 'x-compute-request-id': 'req-07e6e3bf-8c06-42fd-a5e7-2c544a9fa0e3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.815 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:47.870 41 INFO tempest.lib.common.rest_client [req-b69726c6-6727-47ac-97c3-69eca719be6d ] Request (FlavorManageRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec 0.127s 2020-12-05 13:23:47.871 41 DEBUG tempest.lib.common.rest_client [req-b69726c6-6727-47ac-97c3-69eca719be6d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b69726c6-6727-47ac-97c3-69eca719be6d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/a90d96e426864b36ba5c94e7289944ec'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.884 38 INFO tempest.lib.common.rest_client [req-ecf21fd1-a712-478a-8b09-7c39f1dcc5ea ] Request (ImagesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-05 13:23:47.884 38 DEBUG tempest.lib.common.rest_client [req-ecf21fd1-a712-478a-8b09-7c39f1dcc5ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecf21fd1-a712-478a-8b09-7c39f1dcc5ea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.914 39 INFO tempest.lib.common.rest_client [req-1b0a7629-ca49-4f5f-a199-4c909d50a511 ] Request (HostsRbacTest:test_list_hosts): 200 GET http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles 0.098s 2020-12-05 13:23:47.914 39 DEBUG tempest.lib.common.rest_client [req-1b0a7629-ca49-4f5f-a199-4c909d50a511 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1b0a7629-ca49-4f5f-a199-4c909d50a511', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.932 40 INFO tempest.lib.common.rest_client [req-16fff3aa-7df5-4fdb-bc00-3d14cdaf563c ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.150s 2020-12-05 13:23:47.933 40 DEBUG tempest.lib.common.rest_client [req-16fff3aa-7df5-4fdb-bc00-3d14cdaf563c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16fff3aa-7df5-4fdb-bc00-3d14cdaf563c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.934 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:47.934 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:47.958 41 INFO tempest.lib.common.rest_client [req-5451a687-a074-49d5-adb8-3229b6dff06f ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:47.959 41 DEBUG tempest.lib.common.rest_client [req-5451a687-a074-49d5-adb8-3229b6dff06f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5451a687-a074-49d5-adb8-3229b6dff06f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["ulSKhT4bRY-l9DauuhYmiQ"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.990 40 INFO tempest.lib.common.rest_client [req-f6432be6-19ad-4507-a45a-eb15ad85c409 ] Request (FlavorAccessRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.054s 2020-12-05 13:23:47.990 40 DEBUG tempest.lib.common.rest_client [req-f6432be6-19ad-4507-a45a-eb15ad85c409 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6432be6-19ad-4507-a45a-eb15ad85c409', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:47.997 39 INFO tempest.lib.common.rest_client [req-6e77a22c-f177-4bc7-a819-c05020402fcf ] Request (HostsRbacTest:test_list_hosts): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:47.997 39 DEBUG tempest.lib.common.rest_client [req-6e77a22c-f177-4bc7-a819-c05020402fcf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e77a22c-f177-4bc7-a819-c05020402fcf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "password_expires_at": null}, "audit_ids": ["PcLiUmzRRc-cI9MGfkP1pA"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.003 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:48.003 41 INFO tempest.lib.common.rest_client [req-1ce40c5e-3c8c-487e-bcd3-db77c45c786f ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:48.004 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.004 41 DEBUG tempest.lib.common.rest_client [req-1ce40c5e-3c8c-487e-bcd3-db77c45c786f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ce40c5e-3c8c-487e-bcd3-db77c45c786f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["JaUjBlvWQ9evNlecqnr31g"], "expires_at": "2020-12-05T14:23:47.000000Z", "issued_at": "2020-12-05T13:23:47.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.005 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.005 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.006 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.006 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.007 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.008 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.008 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.009 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.009 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.010 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.010 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.010 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.011 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.011 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.011 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.011 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.012 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.012 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.012 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.013 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.013 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.013 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.014 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.014 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.014 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.014 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.015 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.016 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.016 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.016 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.017 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.017 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.017 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.018 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.018 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.018 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.019 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.019 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.019 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.020 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.020 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.020 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.021 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.021 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.022 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.022 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.022 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.023 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.023 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.023 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.023 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.024 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.024 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.024 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.025 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.025 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.025 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.026 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.026 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.027 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.028 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.028 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.028 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.029 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.030 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.030 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.030 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.031 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.031 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:48.032 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hosts:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:48.048 40 INFO tempest.lib.common.rest_client [req-a8d4d25d-c3f2-4d21-90d2-2ed4dac9a444 ] Request (FlavorAccessRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles/72a4576c553448cd941b052c1ca0cf2d 0.057s 2020-12-05 13:23:48.049 40 DEBUG tempest.lib.common.rest_client [req-a8d4d25d-c3f2-4d21-90d2-2ed4dac9a444 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:47 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8d4d25d-c3f2-4d21-90d2-2ed4dac9a444', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.055 41 INFO tempest.lib.common.rest_client [req-20f97476-9696-4da8-adc1-892b1adcfbc9 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-12-05 13:23:48.056 41 DEBUG tempest.lib.common.rest_client [req-20f97476-9696-4da8-adc1-892b1adcfbc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20f97476-9696-4da8-adc1-892b1adcfbc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.159 40 INFO tempest.lib.common.rest_client [req-8f789d0d-44eb-4d26-98ca-53275d5a8487 ] Request (FlavorAccessRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles/a629c95d64b3416fb80ae90af4f69c05 0.108s 2020-12-05 13:23:48.159 40 DEBUG tempest.lib.common.rest_client [req-8f789d0d-44eb-4d26-98ca-53275d5a8487 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f789d0d-44eb-4d26-98ca-53275d5a8487', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.182 41 INFO tempest.lib.common.rest_client [req-215e27f0-42c7-4478-857e-42dc8d90a7cc ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.125s 2020-12-05 13:23:48.182 41 DEBUG tempest.lib.common.rest_client [req-215e27f0-42c7-4478-857e-42dc8d90a7cc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpsBulkRbacTest-1179983229-desc", "domain_id": "default", "name": "tempest-FloatingIpsBulkRbacTest-1179983229"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '384', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-215e27f0-42c7-4478-857e-42dc8d90a7cc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "acbee222f69c4f7180cec68eb0403719", "name": "tempest-FloatingIpsBulkRbacTest-1179983229", "domain_id": "default", "description": "tempest-FloatingIpsBulkRbacTest-1179983229-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.305 41 INFO tempest.lib.common.rest_client [req-ca805be4-4421-48b8-9189-c0c80f5f9491 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-12-05 13:23:48.305 41 DEBUG tempest.lib.common.rest_client [req-ca805be4-4421-48b8-9189-c0c80f5f9491 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpsBulkRbacTest-1179983229", "password": "P2%8zxS~JBBaA4b", "project_id": "acbee222f69c4f7180cec68eb0403719", "email": "tempest-FloatingIpsBulkRbacTest-989389240@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ca805be4-4421-48b8-9189-c0c80f5f9491', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "acbee222f69c4f7180cec68eb0403719", "email": "tempest-FloatingIpsBulkRbacTest-989389240@example.com", "id": "1c3808c4c3a041c08a348883baa9b2dc", "name": "tempest-FloatingIpsBulkRbacTest-1179983229", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/1c3808c4c3a041c08a348883baa9b2dc"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.314 39 INFO tempest.lib.common.rest_client [req-2f43c6fa-3c15-4e50-b084-adb026cc8031 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/compute/v2.1/os-hosts 0.281s 2020-12-05 13:23:48.314 39 DEBUG tempest.lib.common.rest_client [req-2f43c6fa-3c15-4e50-b084-adb026cc8031 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '369', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-2f43c6fa-3c15-4e50-b084-adb026cc8031', 'x-compute-request-id': 'req-2f43c6fa-3c15-4e50-b084-adb026cc8031', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts'} Body: b'{"hosts": [{"host_name": "lf-virtual9", "service": "scheduler", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "conductor", "zone": "internal"}, {"host_name": "lf-virtual9", "service": "compute", "zone": "nova"}, {"host_name": "lf-virtual8", "service": "compute", "zone": "nova"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.318 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:48.353 41 INFO tempest.lib.common.rest_client [req-d6841db0-f6bc-46e2-b850-08ad478d7838 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-12-05 13:23:48.354 41 DEBUG tempest.lib.common.rest_client [req-d6841db0-f6bc-46e2-b850-08ad478d7838 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d6841db0-f6bc-46e2-b850-08ad478d7838', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.374 39 INFO tempest.lib.common.rest_client [req-59e147c2-8dd5-45dd-945f-2227bb093cc3 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles 0.055s 2020-12-05 13:23:48.375 39 DEBUG tempest.lib.common.rest_client [req-59e147c2-8dd5-45dd-945f-2227bb093cc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59e147c2-8dd5-45dd-945f-2227bb093cc3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.463 39 INFO tempest.lib.common.rest_client [req-c2eed6d0-2721-4027-9b3f-dc2adc38fb7c ] Request (HostsRbacTest:test_show_host_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:48.464 39 DEBUG tempest.lib.common.rest_client [req-c2eed6d0-2721-4027-9b3f-dc2adc38fb7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c2eed6d0-2721-4027-9b3f-dc2adc38fb7c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "password_expires_at": null}, "audit_ids": ["x-BUuZbsSsmONCro19L_Nw"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.474 41 INFO tempest.lib.common.rest_client [req-29d7b0ff-0bb0-4dce-bf93-1dde03873b52 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.119s 2020-12-05 13:23:48.474 41 DEBUG tempest.lib.common.rest_client [req-29d7b0ff-0bb0-4dce-bf93-1dde03873b52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-29d7b0ff-0bb0-4dce-bf93-1dde03873b52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.542 41 INFO tempest.lib.common.rest_client [req-8cad1f73-306d-489c-9893-6afcbdba4497 ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-05 13:23:48.542 41 DEBUG tempest.lib.common.rest_client [req-8cad1f73-306d-489c-9893-6afcbdba4497 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8cad1f73-306d-489c-9893-6afcbdba4497', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.543 41 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsBulkRbacTest-1179983229', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'acbee222f69c4f7180cec68eb0403719', 'project_name': 'tempest-FloatingIpsBulkRbacTest-1179983229', 'tenant_id': 'acbee222f69c4f7180cec68eb0403719', 'tenant_name': 'tempest-FloatingIpsBulkRbacTest-1179983229', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1c3808c4c3a041c08a348883baa9b2dc'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:48.543 41 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpsBulkRbacTest-1179983229', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'acbee222f69c4f7180cec68eb0403719', 'project_name': 'tempest-FloatingIpsBulkRbacTest-1179983229', 'tenant_id': 'acbee222f69c4f7180cec68eb0403719', 'tenant_name': 'tempest-FloatingIpsBulkRbacTest-1179983229', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '1c3808c4c3a041c08a348883baa9b2dc'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:48.647 41 INFO tempest.lib.common.rest_client [req-451ba212-9285-4e92-a641-8d9b81703250 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:48.648 41 DEBUG tempest.lib.common.rest_client [req-451ba212-9285-4e92-a641-8d9b81703250 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6577', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-451ba212-9285-4e92-a641-8d9b81703250', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1c3808c4c3a041c08a348883baa9b2dc", "name": "tempest-FloatingIpsBulkRbacTest-1179983229", "password_expires_at": null}, "audit_ids": ["gG7_bptaQxKj_-lAZ4JWyg"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "acbee222f69c4f7180cec68eb0403719", "name": "tempest-FloatingIpsBulkRbacTest-1179983229"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.651 39 INFO tempest.lib.common.rest_client [req-1fa6dd8e-4ddd-4a59-98af-51fade3b3c41 ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/compute/v2.1/os-hosts/lf-virtual9 0.186s 2020-12-05 13:23:48.652 39 DEBUG tempest.lib.common.rest_client [req-1fa6dd8e-4ddd-4a59-98af-51fade3b3c41 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '461', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1fa6dd8e-4ddd-4a59-98af-51fade3b3c41', 'x-compute-request-id': 'req-1fa6dd8e-4ddd-4a59-98af-51fade3b3c41', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hosts/lf-virtual9'} Body: b'{"host": [{"resource": {"host": "lf-virtual9", "project": "(total)", "cpu": 88, "memory_mb": 64312, "disk_gb": 100}}, {"resource": {"host": "lf-virtual9", "project": "(used_now)", "cpu": 1, "memory_mb": 1536, "disk_gb": 1}}, {"resource": {"host": "lf-virtual9", "project": "(used_max)", "cpu": 1, "memory_mb": 1024, "disk_gb": 1}}, {"resource": {"host": "lf-virtual9", "project": "d159c8fc495f420e9eee6697ed905d68", "cpu": 1, "memory_mb": 1024, "disk_gb": 1}}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.654 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:48.728 41 INFO tempest.lib.common.rest_client [req-9ca596fa-2be6-4ef3-a37b-91231559920c ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:23:48.729 41 DEBUG tempest.lib.common.rest_client [req-9ca596fa-2be6-4ef3-a37b-91231559920c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ca596fa-2be6-4ef3-a37b-91231559920c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["7QtX1CIfQq2zcwCZR2dd8A"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.749 39 INFO tempest.lib.common.rest_client [req-ecf0bf9b-a3e5-43bc-829f-50ee645509cf ] Request (HostsRbacTest:test_show_host_details): 200 GET http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles 0.093s 2020-12-05 13:23:48.749 39 DEBUG tempest.lib.common.rest_client [req-ecf0bf9b-a3e5-43bc-829f-50ee645509cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ecf0bf9b-a3e5-43bc-829f-50ee645509cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c/users/b2d538baa6e049cfa31ecd0d5d41ec86/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.770 41 INFO tempest.lib.common.rest_client [req-5bdd1d6f-e564-4c19-a8be-c916235ecdf3 ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.028s 2020-12-05 13:23:48.770 41 DEBUG tempest.lib.common.rest_client [req-5bdd1d6f-e564-4c19-a8be-c916235ecdf3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5bdd1d6f-e564-4c19-a8be-c916235ecdf3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["zRq0XupfTxSYDncziJjsgw"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.815 41 INFO tempest.lib.common.rest_client [req-c987e980-36a0-44e8-ac15-ce04d8c1c1b0 ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.044s 2020-12-05 13:23:48.816 41 DEBUG tempest.lib.common.rest_client [req-c987e980-36a0-44e8-ac15-ce04d8c1c1b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c987e980-36a0-44e8-ac15-ce04d8c1c1b0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.833 39 INFO tempest.lib.common.rest_client [req-03f897ea-b51a-4f40-9e20-2c71b8b40815 ] Request (HostsRbacTest:test_show_host_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:48.834 39 DEBUG tempest.lib.common.rest_client [req-03f897ea-b51a-4f40-9e20-2c71b8b40815 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03f897ea-b51a-4f40-9e20-2c71b8b40815', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "b2d538baa6e049cfa31ecd0d5d41ec86", "name": "tempest-HostsRbacTest-1139301709", "password_expires_at": null}, "audit_ids": ["yoeI295YSK6RlTnTFcLuXg"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "5dc28a8adb8b47a3b873ac6da0e0971c", "name": "tempest-HostsRbacTest-1139301709"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_5dc28a8adb8b47a3b873ac6da0e0971c", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.861 41 INFO tempest.lib.common.rest_client [req-eddbfdf0-214a-4131-a4d0-efacd171e87b ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-12-05 13:23:48.862 41 DEBUG tempest.lib.common.rest_client [req-eddbfdf0-214a-4131-a4d0-efacd171e87b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eddbfdf0-214a-4131-a4d0-efacd171e87b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.863 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:48.863 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:48.909 41 INFO tempest.lib.common.rest_client [req-4db7a75e-9122-41a5-bc58-f743ad793eee ] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles 0.045s 2020-12-05 13:23:48.910 41 DEBUG tempest.lib.common.rest_client [req-4db7a75e-9122-41a5-bc58-f743ad793eee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4db7a75e-9122-41a5-bc58-f743ad793eee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.952 39 INFO tempest.lib.common.rest_client [req-5da8d2b8-986d-4e39-9093-ce4f111dc788 ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/b2d538baa6e049cfa31ecd0d5d41ec86 0.113s 2020-12-05 13:23:48.953 39 DEBUG tempest.lib.common.rest_client [req-5da8d2b8-986d-4e39-9093-ce4f111dc788 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5da8d2b8-986d-4e39-9093-ce4f111dc788', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/b2d538baa6e049cfa31ecd0d5d41ec86'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.954 38 INFO tempest.lib.common.rest_client [req-79a34add-62bf-4bf4-9974-9cdc8dffce16 ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.067s 2020-12-05 13:23:48.954 38 DEBUG tempest.lib.common.rest_client [req-79a34add-62bf-4bf4-9974-9cdc8dffce16 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79a34add-62bf-4bf4-9974-9cdc8dffce16', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["A8Z2SCYET-qE8R7q0xuHgA"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:48.960 41 INFO tempest.lib.common.rest_client [req-08adf881-3e85-4f3a-a443-8d28408c1bec ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles/72a4576c553448cd941b052c1ca0cf2d 0.050s 2020-12-05 13:23:48.961 41 DEBUG tempest.lib.common.rest_client [req-08adf881-3e85-4f3a-a443-8d28408c1bec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-08adf881-3e85-4f3a-a443-8d28408c1bec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.024 39 INFO tempest.lib.common.rest_client [req-d082cecb-181c-4785-9f02-8750d042efd7 ] Request (HostsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.071s 2020-12-05 13:23:49.025 39 DEBUG tempest.lib.common.rest_client [req-d082cecb-181c-4785-9f02-8750d042efd7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d082cecb-181c-4785-9f02-8750d042efd7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["C4P5YD2nSTS_QLvHID5qIQ"], "expires_at": "2020-12-05T14:23:48.000000Z", "issued_at": "2020-12-05T13:23:48.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.047 41 INFO tempest.lib.common.rest_client [req-634d2883-1668-48ce-8521-c0cbd52f2ab3 ] Request (FloatingIpsBulkRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles/a629c95d64b3416fb80ae90af4f69c05 0.085s 2020-12-05 13:23:49.047 41 DEBUG tempest.lib.common.rest_client [req-634d2883-1668-48ce-8521-c0cbd52f2ab3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-634d2883-1668-48ce-8521-c0cbd52f2ab3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719/users/1c3808c4c3a041c08a348883baa9b2dc/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.214 38 INFO tempest.lib.common.rest_client [req-b45e29a2-e5f5-49cd-8710-ee400b661a9f ] Request (ImagesRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.257s 2020-12-05 13:23:49.215 38 DEBUG tempest.lib.common.rest_client [req-b45e29a2-e5f5-49cd-8710-ee400b661a9f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesRbacTest-image-235003548"} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:48 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '642', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-b45e29a2-e5f5-49cd-8710-ee400b661a9f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesRbacTest-image-235003548", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "3043ec12e06e4cc88a69094be73f9dea", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "bbddb70c-d036-4401-9953-cfed46f3c7ba", "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "tags": [], "self": "/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba", "file": "/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.216 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:49.217 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.219 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: delete_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:49.239 40 INFO tempest.lib.common.rest_client [req-e5f88c54-0f6d-448f-8656-25a000407d5e ] Request (FlavorAccessRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:49.240 40 DEBUG tempest.lib.common.rest_client [req-e5f88c54-0f6d-448f-8656-25a000407d5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5f88c54-0f6d-448f-8656-25a000407d5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["FfY52TPRQjmO6bUVY6F7Bw"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.265 38 INFO tempest.lib.common.rest_client [req-3f7c86f5-4946-4798-b729-cee76805abf9 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/image/v2/images 0.045s 2020-12-05 13:23:49.266 38 DEBUG tempest.lib.common.rest_client [req-3f7c86f5-4946-4798-b729-cee76805abf9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImagesRbacTest-image-172599627"} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '642', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-3f7c86f5-4946-4798-b729-cee76805abf9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImagesRbacTest-image-172599627", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "3043ec12e06e4cc88a69094be73f9dea", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "c2ad30fe-a2a2-400a-a475-f89d7bd207cd", "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "tags": [], "self": "/v2/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd", "file": "/v2/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.267 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:49.317 38 INFO tempest.lib.common.rest_client [req-fa3f12c5-9b11-4ba9-925f-ee56a7804ceb ] Request (ImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.049s 2020-12-05 13:23:49.318 38 DEBUG tempest.lib.common.rest_client [req-fa3f12c5-9b11-4ba9-925f-ee56a7804ceb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa3f12c5-9b11-4ba9-925f-ee56a7804ceb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.353 38 INFO tempest.lib.common.rest_client [req-5c477777-55cc-4999-8a9f-e0c2e38b9793 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:49.354 38 DEBUG tempest.lib.common.rest_client [req-5c477777-55cc-4999-8a9f-e0c2e38b9793 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c477777-55cc-4999-8a9f-e0c2e38b9793', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["wC3Prg2mQCeguhkxFERuHA"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.432 39 INFO tempest.lib.common.rest_client [req-f06b1a48-6fbd-4d2f-a6cc-ac63d5e0191d ] Request (HostsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5dc28a8adb8b47a3b873ac6da0e0971c&name=default 0.406s 2020-12-05 13:23:49.433 39 DEBUG tempest.lib.common.rest_client [req-f06b1a48-6fbd-4d2f-a6cc-ac63d5e0191d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f06b1a48-6fbd-4d2f-a6cc-ac63d5e0191d', 'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=5dc28a8adb8b47a3b873ac6da0e0971c&name=default'} Body: b'{"security_groups": [{"id": "4c30cd51-76eb-4121-bd92-689605bc5828", "name": "default", "stateful": true, "tenant_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "description": "Default security group", "security_group_rules": [{"id": "34a97dd8-1b90-48cc-b83b-a92b23a3d2e9", "tenant_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "security_group_id": "4c30cd51-76eb-4121-bd92-689605bc5828", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "revision_number": 0, "project_id": "5dc28a8adb8b47a3b873ac6da0e0971c"}, {"id": "4efeb6f3-ab42-462c-adc2-482286a5e204", "tenant_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "security_group_id": "4c30cd51-76eb-4121-bd92-689605bc5828", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4c30cd51-76eb-4121-bd92-689605bc5828", "description": null, "tags": [], "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "revision_number": 0, "project_id": "5dc28a8adb8b47a3b873ac6da0e0971c"}, {"id": "51d87f75-4deb-405c-94f2-a297755b6d22", "tenant_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "security_group_id": "4c30cd51-76eb-4121-bd92-689605bc5828", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "4c30cd51-76eb-4121-bd92-689605bc5828", "description": null, "tags": [], "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "revision_number": 0, "project_id": "5dc28a8adb8b47a3b873ac6da0e0971c"}, {"id": "85eb2889-d18e-4e6b-b796-93dcc2a67c68", "tenant_id": "5dc28a8adb8b47a3b873ac6da0e0971c", "security_group_id": "4c30cd51-76eb-4121-bd92-689605bc5828", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "revision_number": 0, "project_id": "5dc28a8adb8b47a3b873ac6da0e0971c"}], "tags": [], "created_at": "2020-12-05T13:23:49Z", "updated_at": "2020-12-05T13:23:49Z", "revision_number": 1, "project_id": "5dc28a8adb8b47a3b873ac6da0e0971c"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.459 40 INFO tempest.lib.common.rest_client [req-64b36b06-0274-48cc-a0df-978e30a06543 ] Request (FlavorAccessRbacTest:setUpClass): 200 POST http://172.30.13.94/compute/v2.1/flavors 0.217s 2020-12-05 13:23:49.460 40 DEBUG tempest.lib.common.rest_client [req-64b36b06-0274-48cc-a0df-978e30a06543 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"flavor": {"name": "tempest-FlavorAccessRbacTest-flavor-1777758758", "ram": 2, "vcpus": 3, "disk": 4, "id": "a7187696-4d3a-437d-8e0d-2bc5cea20821", "os-flavor-access:is_public": false}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '507', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-64b36b06-0274-48cc-a0df-978e30a06543', 'x-compute-request-id': 'req-64b36b06-0274-48cc-a0df-978e30a06543', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors'} Body: b'{"flavor": {"id": "a7187696-4d3a-437d-8e0d-2bc5cea20821", "name": "tempest-FlavorAccessRbacTest-flavor-1777758758", "ram": 2, "disk": 4, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 3, "os-flavor-access:is_public": false, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821"}]}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.466 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:49.467 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.467 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.468 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.468 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.468 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.469 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.469 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.469 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.470 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.470 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.470 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.471 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.471 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.471 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.472 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.472 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.472 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.473 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.473 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.473 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.473 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.474 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.474 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.474 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.475 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.475 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.475 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.476 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.476 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.476 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.476 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.477 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.477 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.477 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.478 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.478 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.478 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.478 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.479 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.479 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.479 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.480 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.480 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.480 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.480 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.481 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.481 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.481 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.482 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.482 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.482 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.483 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.483 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.483 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.483 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.484 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.484 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.484 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.485 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.485 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.485 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.486 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.486 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.486 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.487 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.487 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.487 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.488 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.488 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.488 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.488 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.489 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.489 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.489 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.489 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.490 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access:add_tenant_access, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:49.491 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:49.547 40 INFO tempest.lib.common.rest_client [req-6d95ef93-6a64-40e3-80b1-706478fa7dec ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.056s 2020-12-05 13:23:49.547 40 DEBUG tempest.lib.common.rest_client [req-6d95ef93-6a64-40e3-80b1-706478fa7dec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d95ef93-6a64-40e3-80b1-706478fa7dec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.580 39 INFO tempest.lib.common.rest_client [req-7f335f27-c39c-43d8-b3f2-9df0ad6ecceb ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/4c30cd51-76eb-4121-bd92-689605bc5828 0.146s 2020-12-05 13:23:49.580 40 INFO tempest.lib.common.rest_client [req-2ecc66da-51be-44c7-b9a9-b8403b25c528 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:49.581 39 DEBUG tempest.lib.common.rest_client [req-7f335f27-c39c-43d8-b3f2-9df0ad6ecceb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-7f335f27-c39c-43d8-b3f2-9df0ad6ecceb', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/4c30cd51-76eb-4121-bd92-689605bc5828'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.580 38 INFO tempest.lib.common.rest_client [req-179b7e70-c818-4a68-ab6a-91a50eec4578 ] Request (ImagesRbacTest:test_delete_image): 204 DELETE http://172.30.13.94/compute/v2.1/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd 0.225s 2020-12-05 13:23:49.581 40 DEBUG tempest.lib.common.rest_client [req-2ecc66da-51be-44c7-b9a9-b8403b25c528 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ecc66da-51be-44c7-b9a9-b8403b25c528', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["ss1krcfbTICNkEtHUc196A"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.581 38 DEBUG tempest.lib.common.rest_client [req-179b7e70-c818-4a68-ab6a-91a50eec4578 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-179b7e70-c818-4a68-ab6a-91a50eec4578', 'x-compute-request-id': 'req-179b7e70-c818-4a68-ab6a-91a50eec4578', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/compute/v2.1/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.582 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:49.629 38 INFO tempest.lib.common.rest_client [req-f79468d6-153f-464f-92e9-6c6b75353e58 ] Request (ImagesRbacTest:test_delete_image): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.047s 2020-12-05 13:23:49.630 38 DEBUG tempest.lib.common.rest_client [req-f79468d6-153f-464f-92e9-6c6b75353e58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f79468d6-153f-464f-92e9-6c6b75353e58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.709 38 INFO tempest.lib.common.rest_client [req-b13fb017-7a6e-4704-9a8c-d6c184d8e7a4 ] Request (ImagesRbacTest:test_delete_image): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:49.709 38 DEBUG tempest.lib.common.rest_client [req-b13fb017-7a6e-4704-9a8c-d6c184d8e7a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b13fb017-7a6e-4704-9a8c-d6c184d8e7a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["736IplxESD28bG6FdQv_oA"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.712 39 INFO tempest.lib.common.rest_client [req-5002306e-5c04-419d-b28c-180ecb239bfb ] Request (HostsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c 0.130s 2020-12-05 13:23:49.713 39 DEBUG tempest.lib.common.rest_client [req-5002306e-5c04-419d-b28c-180ecb239bfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5002306e-5c04-419d-b28c-180ecb239bfb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/5dc28a8adb8b47a3b873ac6da0e0971c'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.795 40 INFO tempest.lib.common.rest_client [req-1a8aa921-ce0f-4fe7-a52f-2ee68ee4d54f ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.213s 2020-12-05 13:23:49.796 40 DEBUG tempest.lib.common.rest_client [req-1a8aa921-ce0f-4fe7-a52f-2ee68ee4d54f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1a8aa921-ce0f-4fe7-a52f-2ee68ee4d54f', 'x-compute-request-id': 'req-1a8aa921-ce0f-4fe7-a52f-2ee68ee4d54f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"flavor_access": [{"flavor_id": "a7187696-4d3a-437d-8e0d-2bc5cea20821", "tenant_id": "21dadce4be4f4477a4724873bc2c6493"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.798 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:49.857 39 INFO tempest.lib.common.rest_client [req-1468f128-5f75-4414-8e01-4caf8c8d79d4 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.141s 2020-12-05 13:23:49.858 39 DEBUG tempest.lib.common.rest_client [req-1468f128-5f75-4414-8e01-4caf8c8d79d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1468f128-5f75-4414-8e01-4caf8c8d79d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["w9ps6p6tQr6GZm3B5A2CIw"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.883 38 INFO tempest.lib.common.rest_client [req-f6cb834e-8cd7-42c5-89d5-34b128fab23c ] Request (ImagesRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/image/v2/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd 0.173s 2020-12-05 13:23:49.884 38 DEBUG tempest.lib.common.rest_client [req-f6cb834e-8cd7-42c5-89d5-34b128fab23c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '147', 'content-type': 'application/json', 'x-openstack-request-id': 'req-f6cb834e-8cd7-42c5-89d5-34b128fab23c', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/c2ad30fe-a2a2-400a-a475-f89d7bd207cd'} Body: b'{"message": "Failed to find image c2ad30fe-a2a2-400a-a475-f89d7bd207cd to delete

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.886 40 INFO tempest.lib.common.rest_client [req-2b7c977c-9b1b-4c77-8e59-fc938084819a ] Request (FlavorAccessRbacTest:test_add_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.087s 2020-12-05 13:23:49.887 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:49.887 40 DEBUG tempest.lib.common.rest_client [req-2b7c977c-9b1b-4c77-8e59-fc938084819a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b7c977c-9b1b-4c77-8e59-fc938084819a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.887 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:49.889 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:49.889 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:49.899 39 INFO tempest.lib.common.rest_client [req-b9b7107c-3b7d-4f19-9a1c-eda0c05914b8 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:49.900 39 DEBUG tempest.lib.common.rest_client [req-b9b7107c-3b7d-4f19-9a1c-eda0c05914b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9b7107c-3b7d-4f19-9a1c-eda0c05914b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["gE_c4GcnQiuobBkp_l5ibA"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.923 40 INFO tempest.lib.common.rest_client [req-006fff8a-64b3-4ffe-8b58-21d4256bf4d5 ] Request (FlavorAccessRbacTest:test_add_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:49.923 40 DEBUG tempest.lib.common.rest_client [req-006fff8a-64b3-4ffe-8b58-21d4256bf4d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-006fff8a-64b3-4ffe-8b58-21d4256bf4d5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["qEjmjwtEQOCyN6r9Y6S39g"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.940 38 INFO tempest.lib.common.rest_client [req-43a0beff-67af-4701-b3dc-8d08ff9ebbec ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.049s 2020-12-05 13:23:49.941 38 DEBUG tempest.lib.common.rest_client [req-43a0beff-67af-4701-b3dc-8d08ff9ebbec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43a0beff-67af-4701-b3dc-8d08ff9ebbec', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.944 39 INFO tempest.lib.common.rest_client [req-b1f7cc9a-6b8b-4acf-850e-b122e4eeb353 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.043s 2020-12-05 13:23:49.945 39 DEBUG tempest.lib.common.rest_client [req-b1f7cc9a-6b8b-4acf-850e-b122e4eeb353 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b1f7cc9a-6b8b-4acf-850e-b122e4eeb353', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.973 38 INFO tempest.lib.common.rest_client [req-b7042cd2-1358-4dd4-ae9f-53e8589a8c10 ] Request (ImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:49.974 38 DEBUG tempest.lib.common.rest_client [req-b7042cd2-1358-4dd4-ae9f-53e8589a8c10 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7042cd2-1358-4dd4-ae9f-53e8589a8c10', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["wBKLPE-iT3uw26Lc-1htQg"], "expires_at": "2020-12-05T14:23:49.000000Z", "issued_at": "2020-12-05T13:23:49.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:49.997 39 INFO tempest.lib.common.rest_client [req-4d6750a5-842e-4220-aa0e-838ad37c2adc ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.051s 2020-12-05 13:23:49.998 39 DEBUG tempest.lib.common.rest_client [req-4d6750a5-842e-4220-aa0e-838ad37c2adc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HypervisorRbacTest-666614047-desc", "domain_id": "default", "name": "tempest-HypervisorRbacTest-666614047"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d6750a5-842e-4220-aa0e-838ad37c2adc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047", "domain_id": "default", "description": "tempest-HypervisorRbacTest-666614047-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.119 39 INFO tempest.lib.common.rest_client [req-9908bcfe-f11c-4d68-8c7d-75acae628eed ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.120s 2020-12-05 13:23:50.120 39 DEBUG tempest.lib.common.rest_client [req-9908bcfe-f11c-4d68-8c7d-75acae628eed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HypervisorRbacTest-666614047", "password": "N6#B5uQP8Gc8d*%", "project_id": "9a3c534f6998402cb965dc3e3a351e24", "email": "tempest-HypervisorRbacTest-642033924@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9908bcfe-f11c-4d68-8c7d-75acae628eed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "9a3c534f6998402cb965dc3e3a351e24", "email": "tempest-HypervisorRbacTest-642033924@example.com", "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/eb321cef7db04bf1962c95861cf2adee"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.133 41 INFO tempest.lib.common.rest_client [req-4ba9fbe9-524a-439d-aa19-154aebceceff ] Request (FloatingIpsBulkRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:50.133 41 DEBUG tempest.lib.common.rest_client [req-4ba9fbe9-524a-439d-aa19-154aebceceff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6638', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ba9fbe9-524a-439d-aa19-154aebceceff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "1c3808c4c3a041c08a348883baa9b2dc", "name": "tempest-FloatingIpsBulkRbacTest-1179983229", "password_expires_at": null}, "audit_ids": ["eDtS6yRGT2W8oqLS9ytGlA"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "acbee222f69c4f7180cec68eb0403719", "name": "tempest-FloatingIpsBulkRbacTest-1179983229"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_acbee222f69c4f7180cec68eb0403719", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.139 41 INFO tempest.lib.common.rest_client [-] Request (FloatingIpsBulkRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/ 0.005s 2020-12-05 13:23:50.140 41 DEBUG tempest.lib.common.rest_client [-] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '379', 'content-type': 'application/json', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/'} Body: b'{"versions": [{"id": "v2.0", "status": "SUPPORTED", "version": "", "min_version": "", "updated": "2011-01-21T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2/"}]}, {"id": "v2.1", "status": "CURRENT", "version": "2.87", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/"}]}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.143 41 INFO tempest.test [-] raised in FloatingIpsBulkRbacTest.setUpClass. Invoking tearDownClass. 2020-12-05 13:23:50.167 39 INFO tempest.lib.common.rest_client [req-4821c69f-66ef-4068-b7b3-d6519f939e6b ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-12-05 13:23:50.168 39 DEBUG tempest.lib.common.rest_client [req-4821c69f-66ef-4068-b7b3-d6519f939e6b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4821c69f-66ef-4068-b7b3-d6519f939e6b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.216 39 INFO tempest.lib.common.rest_client [req-24e50d1f-d307-4c4b-9aa0-1f07ef6c5869 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-12-05 13:23:50.216 39 DEBUG tempest.lib.common.rest_client [req-24e50d1f-d307-4c4b-9aa0-1f07ef6c5869 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-24e50d1f-d307-4c4b-9aa0-1f07ef6c5869', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.225 40 INFO tempest.lib.common.rest_client [req-342a4756-fc6f-4b73-9f78-0dee9042bde5 ] Request (FlavorAccessRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.300s 2020-12-05 13:23:50.226 40 DEBUG tempest.lib.common.rest_client [req-342a4756-fc6f-4b73-9f78-0dee9042bde5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-342a4756-fc6f-4b73-9f78-0dee9042bde5', 'x-compute-request-id': 'req-342a4756-fc6f-4b73-9f78-0dee9042bde5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.232 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:50.233 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.233 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.234 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.234 38 INFO tempest.lib.common.rest_client [req-1ecdcc2e-5743-41f6-b9bc-c4196545e194 ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/compute/v2.1/images 0.259s 2020-12-05 13:23:50.234 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.235 38 DEBUG tempest.lib.common.rest_client [req-1ecdcc2e-5743-41f6-b9bc-c4196545e194 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:49 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '4747', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-1ecdcc2e-5743-41f6-b9bc-c4196545e194', 'x-compute-request-id': 'req-1ecdcc2e-5743-41f6-b9bc-c4196545e194', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images'} Body: b'{"images": [{"id": "bbddb70c-d036-4401-9953-cfed46f3c7ba", "name": "tempest-ImagesRbacTest-image-235003548", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}]}, {"id": "e54414df-227d-4fb4-a571-34577fa0a85c", "name": "patrole_member-img_alt_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/e54414df-227d-4fb4-a571-34577fa0a85c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/e54414df-227d-4fb4-a571-34577fa0a85c"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/e54414df-227d-4fb4-a571-34577fa0a85c"}]}, {"id": "ea31bd24-c485-4379-b2df-6f414a2f50d9", "name": "patrole_member-img_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}]}, {"id": "4ac8f1db-be3f-43ce-842c-c85643559904", "name": "tempest-ServerActionsRbacTest-image-1061367818", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4ac8f1db-be3f-43ce-842c-c85643559904"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4ac8f1db-be3f-43ce-842c-c85643559904"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4ac8f1db-be3f-43ce-842c-c85643559904"}]}, {"id": "b3a2affc-6be4-4539-9fcf-20ee8c2c2848", "name": "patrole_admin-img_alt_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/b3a2affc-6be4-4539-9fcf-20ee8c2c2848"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/b3a2affc-6be4-4539-9fcf-20ee8c2c2848"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/b3a2affc-6be4-4539-9fcf-20ee8c2c2848"}]}, {"id": "806a90f7-b939-41d5-9820-a89321f2e74a", "name": "patrole_admin-img_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/806a90f7-b939-41d5-9820-a89321f2e74a"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/806a90f7-b939-41d5-9820-a89321f2e74a"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/806a90f7-b939-41d5-9820-a89321f2e74a"}]}, {"id": "7ed5d7a7-88a2-400f-9cc1-f32149cc936f", "name": "tempest_slow-img_alt_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/7ed5d7a7-88a2-400f-9cc1-f32149cc936f"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/7ed5d7a7-88a2-400f-9cc1-f32149cc936f"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/7ed5d7a7-88a2-400f-9cc1-f32149cc936f"}]}, {"id": "b7b3e347-8055-42b0-b15b-1ac4da64d855", "name": "tempest_slow-img_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/b7b3e347-8055-42b0-b15b-1ac4da64d855"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/b7b3e347-8055-42b0-b15b-1ac4da64d855"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/b7b3e347-8055-42b0-b15b-1ac4da64d855"}]}, {"id": "70a7dd5d-fc3c-401c-994c-cdb25660a12f", "name": "Fedora-Cloud-Base-31-1.9.x86_64", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/70a7dd5d-fc3c-401c-994c-cdb25660a12f"}, {"rel": "bookmark", "href": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.235 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.246 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.258 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.258 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.259 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:50.281 41 INFO tempest.lib.common.rest_client [req-d5100976-037d-4d59-a9d8-a560a9de91b0 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/1c3808c4c3a041c08a348883baa9b2dc 0.136s 2020-12-05 13:23:50.281 41 DEBUG tempest.lib.common.rest_client [req-d5100976-037d-4d59-a9d8-a560a9de91b0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5100976-037d-4d59-a9d8-a560a9de91b0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/1c3808c4c3a041c08a348883baa9b2dc'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.283 39 INFO tempest.lib.common.rest_client [req-6f41247f-a70c-4cc1-9814-6d5aa02dd7e9 ] Request (HypervisorRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles/72a4576c553448cd941b052c1ca0cf2d 0.065s 2020-12-05 13:23:50.283 39 DEBUG tempest.lib.common.rest_client [req-6f41247f-a70c-4cc1-9814-6d5aa02dd7e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6f41247f-a70c-4cc1-9814-6d5aa02dd7e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.284 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorRbacTest-666614047', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a3c534f6998402cb965dc3e3a351e24', 'project_name': 'tempest-HypervisorRbacTest-666614047', 'tenant_id': '9a3c534f6998402cb965dc3e3a351e24', 'tenant_name': 'tempest-HypervisorRbacTest-666614047', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eb321cef7db04bf1962c95861cf2adee'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:50.284 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorRbacTest-666614047', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '9a3c534f6998402cb965dc3e3a351e24', 'project_name': 'tempest-HypervisorRbacTest-666614047', 'tenant_id': '9a3c534f6998402cb965dc3e3a351e24', 'tenant_name': 'tempest-HypervisorRbacTest-666614047', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'eb321cef7db04bf1962c95861cf2adee'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:50.299 38 INFO tempest.lib.common.rest_client [req-1c3dcabd-4bdc-4436-95bb-9e55d9cf612d ] Request (ImagesRbacTest:test_list_images): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.052s 2020-12-05 13:23:50.300 38 DEBUG tempest.lib.common.rest_client [req-1c3dcabd-4bdc-4436-95bb-9e55d9cf612d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1c3dcabd-4bdc-4436-95bb-9e55d9cf612d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.375 41 INFO tempest.lib.common.rest_client [req-9d19fb0c-393e-459d-be1c-4acd95a1f7e4 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-05 13:23:50.375 41 DEBUG tempest.lib.common.rest_client [req-9d19fb0c-393e-459d-be1c-4acd95a1f7e4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d19fb0c-393e-459d-be1c-4acd95a1f7e4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["k7WBibprSROdAcTVJMFkcQ"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.380 38 INFO tempest.lib.common.rest_client [req-829b16ec-9aaa-42a9-a49d-d85578f9847a ] Request (ImagesRbacTest:test_list_images): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:50.381 38 DEBUG tempest.lib.common.rest_client [req-829b16ec-9aaa-42a9-a49d-d85578f9847a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-829b16ec-9aaa-42a9-a49d-d85578f9847a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["gVGOdwCORCGVdc7jS_IDZA"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.384 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:50.385 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.386 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_images, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:50.386 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.410 39 INFO tempest.lib.common.rest_client [req-12209d00-50e9-4c5f-8715-913b47ff551c ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.116s 2020-12-05 13:23:50.411 39 DEBUG tempest.lib.common.rest_client [req-12209d00-50e9-4c5f-8715-913b47ff551c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6565', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-12209d00-50e9-4c5f-8715-913b47ff551c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["Ln3qPzlVTuS_aDMLhede5A"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.436 38 INFO tempest.lib.common.rest_client [req-9bd67742-324c-47eb-bc27-3adaa6167cad ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.049s 2020-12-05 13:23:50.436 38 DEBUG tempest.lib.common.rest_client [req-9bd67742-324c-47eb-bc27-3adaa6167cad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9bd67742-324c-47eb-bc27-3adaa6167cad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.445 39 INFO tempest.lib.common.rest_client [req-20630aaf-ce82-4b8e-9d07-fda0d7818ac0 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:50.445 39 DEBUG tempest.lib.common.rest_client [req-20630aaf-ce82-4b8e-9d07-fda0d7818ac0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20630aaf-ce82-4b8e-9d07-fda0d7818ac0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["vmK9GNOAQzKVSplFcf8PkA"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.474 38 INFO tempest.lib.common.rest_client [req-3235feb7-995c-463c-b825-7bf14f9f40ea ] Request (ImagesRbacTest:test_list_images_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:23:50.474 38 DEBUG tempest.lib.common.rest_client [req-3235feb7-995c-463c-b825-7bf14f9f40ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3235feb7-995c-463c-b825-7bf14f9f40ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["1BkmUhiURTaMtH-Y64NKjw"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.477 40 INFO tempest.lib.common.rest_client [req-aea5b43f-9819-4a8b-bc1f-f0f5ea5341b9 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.218s 2020-12-05 13:23:50.478 40 DEBUG tempest.lib.common.rest_client [req-aea5b43f-9819-4a8b-bc1f-f0f5ea5341b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-aea5b43f-9819-4a8b-bc1f-f0f5ea5341b9', 'x-compute-request-id': 'req-aea5b43f-9819-4a8b-bc1f-f0f5ea5341b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"flavor_access": [{"flavor_id": "a7187696-4d3a-437d-8e0d-2bc5cea20821", "tenant_id": "21dadce4be4f4477a4724873bc2c6493"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.481 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.488 39 INFO tempest.lib.common.rest_client [req-11a1882f-6afa-4305-be80-496639001b17 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:50.488 39 DEBUG tempest.lib.common.rest_client [req-11a1882f-6afa-4305-be80-496639001b17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-11a1882f-6afa-4305-be80-496639001b17', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["WcfLS19ASLC8BXuEmPjNnQ"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.536 40 INFO tempest.lib.common.rest_client [req-33639ba6-cc9e-430d-a16b-e21db1d732e1 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.054s 2020-12-05 13:23:50.537 40 DEBUG tempest.lib.common.rest_client [req-33639ba6-cc9e-430d-a16b-e21db1d732e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-33639ba6-cc9e-430d-a16b-e21db1d732e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.539 39 INFO tempest.lib.common.rest_client [req-58b785ff-c349-4d84-bf6d-62613d003397 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.049s 2020-12-05 13:23:50.539 39 DEBUG tempest.lib.common.rest_client [req-58b785ff-c349-4d84-bf6d-62613d003397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-58b785ff-c349-4d84-bf6d-62613d003397', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.574 40 INFO tempest.lib.common.rest_client [req-234717cc-97ef-4f10-a366-01ea3e5d0554 ] Request (FlavorAccessRbacTest:test_list_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:23:50.574 40 DEBUG tempest.lib.common.rest_client [req-234717cc-97ef-4f10-a366-01ea3e5d0554 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-234717cc-97ef-4f10-a366-01ea3e5d0554', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["dlB-0TNcTGOAYwMdkdL-XQ"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.585 39 INFO tempest.lib.common.rest_client [req-e6c6d25d-2be8-462e-a4ee-f1411d8a6f23 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-12-05 13:23:50.585 39 DEBUG tempest.lib.common.rest_client [req-e6c6d25d-2be8-462e-a4ee-f1411d8a6f23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6c6d25d-2be8-462e-a4ee-f1411d8a6f23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.586 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:50.586 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.628 38 INFO tempest.lib.common.rest_client [req-4883acb1-1ba8-46d3-b0ec-53ede2c8f812 ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/compute/v2.1/images/detail 0.152s 2020-12-05 13:23:50.628 38 DEBUG tempest.lib.common.rest_client [req-4883acb1-1ba8-46d3-b0ec-53ede2c8f812 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '9890', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4883acb1-1ba8-46d3-b0ec-53ede2c8f812', 'x-compute-request-id': 'req-4883acb1-1ba8-46d3-b0ec-53ede2c8f812', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/detail'} Body: b'{"images": [{"id": "bbddb70c-d036-4401-9953-cfed46f3c7ba", "name": "tempest-ImagesRbacTest-image-235003548", "minRam": 0, "minDisk": 0, "metadata": {}, "created": "2020-12-05T13:23:49Z", "updated": "2020-12-05T13:23:49Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}]}, {"id": "e54414df-227d-4fb4-a571-34577fa0a85c", "name": "patrole_member-img_alt_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "minRam": 0, "minDisk": 0, "metadata": {"owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/patrole_member-img_alt_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi"}, "created": "2020-12-05T13:23:12Z", "updated": "2020-12-05T13:23:13Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/e54414df-227d-4fb4-a571-34577fa0a85c"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/e54414df-227d-4fb4-a571-34577fa0a85c"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/e54414df-227d-4fb4-a571-34577fa0a85c"}]}, {"id": "ea31bd24-c485-4379-b2df-6f414a2f50d9", "name": "patrole_member-img_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "minRam": 0, "minDisk": 0, "metadata": {"owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/patrole_member-img_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi"}, "created": "2020-12-05T13:22:42Z", "updated": "2020-12-05T13:22:42Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 12716032, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}]}, {"id": "4ac8f1db-be3f-43ce-842c-c85643559904", "name": "tempest-ServerActionsRbacTest-image-1061367818", "minRam": 0, "minDisk": 1, "metadata": {"hw_disk_bus": "scsi", "hw_scsi_model": "virtio-scsi", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.object": "images/patrole_admin-img_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "base_image_ref": "806a90f7-b939-41d5-9820-a89321f2e74a", "owner_user_name": "tempest-ServerActionsRbacTest-2043447993", "owner_project_name": "tempest-ServerActionsRbacTest-2043447993", "boot_roles": "admin,member,reader", "instance_uuid": "781deef8-04d6-49a3-9628-c0ececc41b21", "user_id": "9cd5a5e0dec6453ba1fd17878905d0ec", "image_type": "snapshot", "owner_id": "d159c8fc495f420e9eee6697ed905d68", "image_state": "available", "image_location": "snapshot"}, "created": "2020-12-05T13:18:32Z", "updated": "2020-12-05T13:18:45Z", "status": "ACTIVE", "progress": 100, "OS-EXT-IMG-SIZE:size": 1073741824, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/4ac8f1db-be3f-43ce-842c-c85643559904"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/4ac8f1db-be3f-43ce-842c-c85643559904"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/4ac8f1db-be3f-43ce-842c-c85643559904"}], "server": {"id": "781deef8-04d6-49a3-962 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.636 39 INFO tempest.lib.common.rest_client [req-2653a9bd-03d0-4b7a-991e-ef743c667040 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.048s 2020-12-05 13:23:50.636 39 DEBUG tempest.lib.common.rest_client [req-2653a9bd-03d0-4b7a-991e-ef743c667040 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2653a9bd-03d0-4b7a-991e-ef743c667040', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.644 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.671 41 INFO tempest.lib.common.rest_client [req-20252b1d-dfda-4a77-9f4c-d1cc50863658 ] Request (FloatingIpsBulkRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=acbee222f69c4f7180cec68eb0403719&name=default 0.294s 2020-12-05 13:23:50.672 41 DEBUG tempest.lib.common.rest_client [req-20252b1d-dfda-4a77-9f4c-d1cc50863658 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-20252b1d-dfda-4a77-9f4c-d1cc50863658', 'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=acbee222f69c4f7180cec68eb0403719&name=default'} Body: b'{"security_groups": [{"id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "name": "default", "stateful": true, "tenant_id": "acbee222f69c4f7180cec68eb0403719", "description": "Default security group", "security_group_rules": [{"id": "154a736d-9035-40c8-b1b5-a2eb9473f603", "tenant_id": "acbee222f69c4f7180cec68eb0403719", "security_group_id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:50Z", "updated_at": "2020-12-05T13:23:50Z", "revision_number": 0, "project_id": "acbee222f69c4f7180cec68eb0403719"}, {"id": "45b5cb21-661c-4896-a4f9-b2bb157e6d91", "tenant_id": "acbee222f69c4f7180cec68eb0403719", "security_group_id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "description": null, "tags": [], "created_at": "2020-12-05T13:23:50Z", "updated_at": "2020-12-05T13:23:50Z", "revision_number": 0, "project_id": "acbee222f69c4f7180cec68eb0403719"}, {"id": "525f42f9-bbd5-4d87-8945-371597470b7b", "tenant_id": "acbee222f69c4f7180cec68eb0403719", "security_group_id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:50Z", "updated_at": "2020-12-05T13:23:50Z", "revision_number": 0, "project_id": "acbee222f69c4f7180cec68eb0403719"}, {"id": "9ae55f6c-9d50-4b1e-974e-67eade194563", "tenant_id": "acbee222f69c4f7180cec68eb0403719", "security_group_id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d742ce12-62f5-4ecc-813a-d547645d6dd8", "description": null, "tags": [], "created_at": "2020-12-05T13:23:50Z", "updated_at": "2020-12-05T13:23:50Z", "revision_number": 0, "project_id": "acbee222f69c4f7180cec68eb0403719"}], "tags": [], "created_at": "2020-12-05T13:23:50Z", "updated_at": "2020-12-05T13:23:50Z", "revision_number": 1, "project_id": "acbee222f69c4f7180cec68eb0403719"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.675 40 INFO tempest.lib.common.rest_client [req-f9f09eac-8cf8-4bf9-853f-7072ed6c007d ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/os-flavor-access 0.099s 2020-12-05 13:23:50.675 40 DEBUG tempest.lib.common.rest_client [req-f9f09eac-8cf8-4bf9-853f-7072ed6c007d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9f09eac-8cf8-4bf9-853f-7072ed6c007d', 'x-compute-request-id': 'req-f9f09eac-8cf8-4bf9-853f-7072ed6c007d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/os-flavor-access'} Body: b'{"flavor_access": [{"flavor_id": "a7187696-4d3a-437d-8e0d-2bc5cea20821", "tenant_id": "21dadce4be4f4477a4724873bc2c6493"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.679 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.684 39 INFO tempest.lib.common.rest_client [req-3228e8b6-de54-4dc7-b394-1d5363f46101 ] Request (HypervisorRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles/72a4576c553448cd941b052c1ca0cf2d 0.047s 2020-12-05 13:23:50.685 39 DEBUG tempest.lib.common.rest_client [req-3228e8b6-de54-4dc7-b394-1d5363f46101 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3228e8b6-de54-4dc7-b394-1d5363f46101', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.693 38 INFO tempest.lib.common.rest_client [req-1d118bea-84f0-4c95-a79f-c5a5d594ca30 ] Request (ImagesRbacTest:test_list_images_with_details): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.048s 2020-12-05 13:23:50.694 38 DEBUG tempest.lib.common.rest_client [req-1d118bea-84f0-4c95-a79f-c5a5d594ca30 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d118bea-84f0-4c95-a79f-c5a5d594ca30', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.780 38 INFO tempest.lib.common.rest_client [req-c529eabf-a10f-4cd9-bd3a-67c41457d132 ] Request (ImagesRbacTest:test_list_images_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-05 13:23:50.780 38 DEBUG tempest.lib.common.rest_client [req-c529eabf-a10f-4cd9-bd3a-67c41457d132 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c529eabf-a10f-4cd9-bd3a-67c41457d132', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["R62kU08OSkuN4t0PDqRjZQ"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.783 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:50.784 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "default":"role:admin" was deprecated in Ussuri in favor of "default":"". Reason: In order to allow operators to accept the default policies from code by not defining them in the policy file, while still working with old policy files that rely on the ``default`` rule for policies that are not specified in the policy file, the ``default`` rule must now be explicitly set to ``"role:admin"`` when that is the desired default for unspecified rules.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:50.786 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: get_image, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:50.786 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:50.792 40 INFO tempest.lib.common.rest_client [req-e564350b-dda1-421c-9567-a545a45ea93d ] Request (FlavorAccessRbacTest:test_list_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.112s 2020-12-05 13:23:50.792 40 DEBUG tempest.lib.common.rest_client [req-e564350b-dda1-421c-9567-a545a45ea93d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e564350b-dda1-421c-9567-a545a45ea93d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.793 41 INFO tempest.lib.common.rest_client [req-c9cb69a8-af0f-4ee2-832c-36322ec2794a ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d742ce12-62f5-4ecc-813a-d547645d6dd8 0.120s 2020-12-05 13:23:50.794 41 DEBUG tempest.lib.common.rest_client [req-c9cb69a8-af0f-4ee2-832c-36322ec2794a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c9cb69a8-af0f-4ee2-832c-36322ec2794a', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d742ce12-62f5-4ecc-813a-d547645d6dd8'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.801 39 INFO tempest.lib.common.rest_client [req-ebbe019d-e8d3-4809-b291-fe7de1535239 ] Request (HypervisorRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles/a629c95d64b3416fb80ae90af4f69c05 0.115s 2020-12-05 13:23:50.801 39 DEBUG tempest.lib.common.rest_client [req-ebbe019d-e8d3-4809-b291-fe7de1535239 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ebbe019d-e8d3-4809-b291-fe7de1535239', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.878 40 INFO tempest.lib.common.rest_client [req-f77b6e3c-18f0-4121-b1d3-e014aaf438bc ] Request (FlavorAccessRbacTest:test_list_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-05 13:23:50.878 40 DEBUG tempest.lib.common.rest_client [req-f77b6e3c-18f0-4121-b1d3-e014aaf438bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f77b6e3c-18f0-4121-b1d3-e014aaf438bc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["p-2ON2lKTqGtKvw-h7BJbA"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.887 38 INFO tempest.lib.common.rest_client [req-1ac8560f-c143-406c-ba39-0e069e14c646 ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.100s 2020-12-05 13:23:50.888 38 DEBUG tempest.lib.common.rest_client [req-1ac8560f-c143-406c-ba39-0e069e14c646 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ac8560f-c143-406c-ba39-0e069e14c646', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.970 38 INFO tempest.lib.common.rest_client [req-0e8406a1-b9c9-4c95-a04d-5e5db92a22e2 ] Request (ImagesRbacTest:test_show_image_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:50.971 38 DEBUG tempest.lib.common.rest_client [req-0e8406a1-b9c9-4c95-a04d-5e5db92a22e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e8406a1-b9c9-4c95-a04d-5e5db92a22e2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["gjEpU7JjTKq-ajb6C6cRHw"], "expires_at": "2020-12-05T14:23:50.000000Z", "issued_at": "2020-12-05T13:23:50.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:50.986 41 INFO tempest.lib.common.rest_client [req-bdd2431e-03eb-4959-96e6-acce6079946a ] Request (FloatingIpsBulkRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719 0.192s 2020-12-05 13:23:50.986 41 DEBUG tempest.lib.common.rest_client [req-bdd2431e-03eb-4959-96e6-acce6079946a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bdd2431e-03eb-4959-96e6-acce6079946a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/acbee222f69c4f7180cec68eb0403719'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.083 41 INFO tempest.lib.common.rest_client [req-7e836bf3-97c8-4be6-9fed-fd56aec6061e ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-05 13:23:51.084 41 DEBUG tempest.lib.common.rest_client [req-7e836bf3-97c8-4be6-9fed-fd56aec6061e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7e836bf3-97c8-4be6-9fed-fd56aec6061e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["yQviYhLRQV6Ou5pe__C4CA"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.129 41 INFO tempest.lib.common.rest_client [req-1cb2607b-6a05-4588-841a-48712a725514 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:51.129 41 DEBUG tempest.lib.common.rest_client [req-1cb2607b-6a05-4588-841a-48712a725514 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cb2607b-6a05-4588-841a-48712a725514', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["jBJwJafBTgmAmajsO9omAA"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.178 41 INFO tempest.lib.common.rest_client [req-40a46bdc-1e60-45cd-b066-0c7cf3873a3a ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.047s 2020-12-05 13:23:51.178 41 DEBUG tempest.lib.common.rest_client [req-40a46bdc-1e60-45cd-b066-0c7cf3873a3a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40a46bdc-1e60-45cd-b066-0c7cf3873a3a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.209 38 INFO tempest.lib.common.rest_client [req-6d535566-3c65-452f-981b-549c068e223e ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/compute/v2.1/images/bbddb70c-d036-4401-9953-cfed46f3c7ba 0.236s 2020-12-05 13:23:51.209 38 DEBUG tempest.lib.common.rest_client [req-6d535566-3c65-452f-981b-549c068e223e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '649', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6d535566-3c65-452f-981b-549c068e223e', 'x-compute-request-id': 'req-6d535566-3c65-452f-981b-549c068e223e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/images/bbddb70c-d036-4401-9953-cfed46f3c7ba'} Body: b'{"image": {"id": "bbddb70c-d036-4401-9953-cfed46f3c7ba", "name": "tempest-ImagesRbacTest-image-235003548", "minRam": 0, "minDisk": 0, "metadata": {}, "created": "2020-12-05T13:23:49Z", "updated": "2020-12-05T13:23:49Z", "status": "SAVING", "progress": 25, "OS-EXT-IMG-SIZE:size": 0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}, {"rel": "alternate", "type": "application/vnd.openstack.image", "href": "http://172.30.13.94/image/images/bbddb70c-d036-4401-9953-cfed46f3c7ba"}]}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.218 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:51.227 40 INFO tempest.lib.common.rest_client [req-9a356edc-db44-453d-858d-ed59ad0a6c87 ] Request (FlavorAccessRbacTest:_run_cleanups): 200 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.346s 2020-12-05 13:23:51.227 40 DEBUG tempest.lib.common.rest_client [req-9a356edc-db44-453d-858d-ed59ad0a6c87 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:50 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9a356edc-db44-453d-858d-ed59ad0a6c87', 'x-compute-request-id': 'req-9a356edc-db44-453d-858d-ed59ad0a6c87', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.235 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:51.235 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.236 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.237 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.238 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.239 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.240 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.241 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.242 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.243 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.244 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.245 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.246 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.247 41 INFO tempest.lib.common.rest_client [req-8a43e7fe-e070-4a9a-a0e1-18a8dc8f59e8 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.067s 2020-12-05 13:23:51.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.247 41 DEBUG tempest.lib.common.rest_client [req-8a43e7fe-e070-4a9a-a0e1-18a8dc8f59e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-KeypairsRbacTest-136457460-desc", "domain_id": "default", "name": "tempest-KeypairsRbacTest-136457460"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '368', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a43e7fe-e070-4a9a-a0e1-18a8dc8f59e8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460", "domain_id": "default", "description": "tempest-KeypairsRbacTest-136457460-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.247 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.248 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.249 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.250 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.251 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.252 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.253 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.254 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.255 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.256 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.257 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.258 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.258 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:51.259 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-flavor-access:remove_tenant_access, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:51.276 38 INFO tempest.lib.common.rest_client [req-85e095ca-10e7-4b28-bf9b-e6e57fbd1ac7 ] Request (ImagesRbacTest:test_show_image_details): 200 GET http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles 0.057s 2020-12-05 13:23:51.277 38 DEBUG tempest.lib.common.rest_client [req-85e095ca-10e7-4b28-bf9b-e6e57fbd1ac7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-85e095ca-10e7-4b28-bf9b-e6e57fbd1ac7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea/users/3ad453ba4c73411594153bbbd96ac0ab/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.351 41 INFO tempest.lib.common.rest_client [req-101f90ae-fc68-4a2f-a071-31a9a7af1cad ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.102s 2020-12-05 13:23:51.351 41 DEBUG tempest.lib.common.rest_client [req-101f90ae-fc68-4a2f-a071-31a9a7af1cad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-KeypairsRbacTest-136457460", "password": "L4*#1@=higkoL=t", "project_id": "21b4c2314aed40c0aeda2a6804ed7a83", "email": "tempest-KeypairsRbacTest-117429503@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '386', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-101f90ae-fc68-4a2f-a071-31a9a7af1cad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "21b4c2314aed40c0aeda2a6804ed7a83", "email": "tempest-KeypairsRbacTest-117429503@example.com", "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/fc1ac36dc4c74d21abba4bc0d6883d41"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.366 38 INFO tempest.lib.common.rest_client [req-5b9a4791-c77f-41db-9b74-5cf2f00829e6 ] Request (ImagesRbacTest:test_show_image_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:23:51.367 38 DEBUG tempest.lib.common.rest_client [req-5b9a4791-c77f-41db-9b74-5cf2f00829e6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6618', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5b9a4791-c77f-41db-9b74-5cf2f00829e6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "3ad453ba4c73411594153bbbd96ac0ab", "name": "tempest-ImagesRbacTest-508515993", "password_expires_at": null}, "audit_ids": ["oanuNBjGTludlshRaB8XjQ"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3043ec12e06e4cc88a69094be73f9dea", "name": "tempest-ImagesRbacTest-508515993"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3043ec12e06e4cc88a69094be73f9dea", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.406 41 INFO tempest.lib.common.rest_client [req-fb76bd79-b86a-4592-97c4-5d34fc44f293 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-05 13:23:51.407 41 DEBUG tempest.lib.common.rest_client [req-fb76bd79-b86a-4592-97c4-5d34fc44f293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fb76bd79-b86a-4592-97c4-5d34fc44f293', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.462 41 INFO tempest.lib.common.rest_client [req-97bd7d52-1a93-44c8-91b6-73d063d0df24 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-05 13:23:51.462 41 DEBUG tempest.lib.common.rest_client [req-97bd7d52-1a93-44c8-91b6-73d063d0df24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-97bd7d52-1a93-44c8-91b6-73d063d0df24', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.477 40 INFO tempest.lib.common.rest_client [req-156a8029-51ed-4968-9c70-004d792ec34e ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.217s 2020-12-05 13:23:51.477 40 DEBUG tempest.lib.common.rest_client [req-156a8029-51ed-4968-9c70-004d792ec34e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"addTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '123', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-156a8029-51ed-4968-9c70-004d792ec34e', 'x-compute-request-id': 'req-156a8029-51ed-4968-9c70-004d792ec34e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"flavor_access": [{"flavor_id": "a7187696-4d3a-437d-8e0d-2bc5cea20821", "tenant_id": "21dadce4be4f4477a4724873bc2c6493"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.481 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:51.536 40 INFO tempest.lib.common.rest_client [req-0e64dd12-d414-4bbc-889a-f2a93cd0170b ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.054s 2020-12-05 13:23:51.536 40 DEBUG tempest.lib.common.rest_client [req-0e64dd12-d414-4bbc-889a-f2a93cd0170b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0e64dd12-d414-4bbc-889a-f2a93cd0170b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.539 41 INFO tempest.lib.common.rest_client [req-c860bfc7-7c9a-4675-ba44-7879bd6ef82c ] Request (KeypairsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles/72a4576c553448cd941b052c1ca0cf2d 0.075s 2020-12-05 13:23:51.539 41 DEBUG tempest.lib.common.rest_client [req-c860bfc7-7c9a-4675-ba44-7879bd6ef82c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c860bfc7-7c9a-4675-ba44-7879bd6ef82c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.540 41 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-KeypairsRbacTest-136457460', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21b4c2314aed40c0aeda2a6804ed7a83', 'project_name': 'tempest-KeypairsRbacTest-136457460', 'tenant_id': '21b4c2314aed40c0aeda2a6804ed7a83', 'tenant_name': 'tempest-KeypairsRbacTest-136457460', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fc1ac36dc4c74d21abba4bc0d6883d41'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:51.540 41 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-KeypairsRbacTest-136457460', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '21b4c2314aed40c0aeda2a6804ed7a83', 'project_name': 'tempest-KeypairsRbacTest-136457460', 'tenant_id': '21b4c2314aed40c0aeda2a6804ed7a83', 'tenant_name': 'tempest-KeypairsRbacTest-136457460', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'fc1ac36dc4c74d21abba4bc0d6883d41'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:51.591 38 INFO tempest.lib.common.rest_client [req-5ef2532f-7e4a-4aeb-af5a-decd150229d4 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba 0.221s 2020-12-05 13:23:51.592 38 DEBUG tempest.lib.common.rest_client [req-5ef2532f-7e4a-4aeb-af5a-decd150229d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-5ef2532f-7e4a-4aeb-af5a-decd150229d4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.612 38 INFO tempest.lib.common.rest_client [req-e94d620d-8b51-4409-82d8-a15fd9c8f026 ] Request (ImagesRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba 0.019s 2020-12-05 13:23:51.612 38 DEBUG tempest.lib.common.rest_client [req-e94d620d-8b51-4409-82d8-a15fd9c8f026 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-e94d620d-8b51-4409-82d8-a15fd9c8f026', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/bbddb70c-d036-4401-9953-cfed46f3c7ba'} Body: b'{"message": "No image found with ID bbddb70c-d036-4401-9953-cfed46f3c7ba

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.624 40 INFO tempest.lib.common.rest_client [req-48d7c2f5-53b8-4ec5-ae62-258f17f755f1 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-05 13:23:51.624 40 DEBUG tempest.lib.common.rest_client [req-48d7c2f5-53b8-4ec5-ae62-258f17f755f1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48d7c2f5-53b8-4ec5-ae62-258f17f755f1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["JPMJJZZ8QRqBTUnqcORAuA"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.643 41 INFO tempest.lib.common.rest_client [req-f178f03d-1732-4988-b02d-d71b035d5178 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-05 13:23:51.644 41 DEBUG tempest.lib.common.rest_client [req-f178f03d-1732-4988-b02d-d71b035d5178 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6561', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f178f03d-1732-4988-b02d-d71b035d5178', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["GBiJzmcMRhGCTanc4HO9dg"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.724 41 INFO tempest.lib.common.rest_client [req-831be5fc-5f4f-49ea-92d4-531cbe9045a8 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:51.724 41 DEBUG tempest.lib.common.rest_client [req-831be5fc-5f4f-49ea-92d4-531cbe9045a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-831be5fc-5f4f-49ea-92d4-531cbe9045a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["7A9mTU_FTceoNP6JNK9Upg"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.772 41 INFO tempest.lib.common.rest_client [req-068c164a-7bbd-4368-933a-32530b17c8b8 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:23:51.772 41 DEBUG tempest.lib.common.rest_client [req-068c164a-7bbd-4368-933a-32530b17c8b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-068c164a-7bbd-4368-933a-32530b17c8b8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["7hamP7XbSe6knCsURG0TVw"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.802 38 INFO tempest.lib.common.rest_client [req-5cdc90b7-e13f-4389-bab7-792e241232ec ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/3ad453ba4c73411594153bbbd96ac0ab 0.188s 2020-12-05 13:23:51.802 38 DEBUG tempest.lib.common.rest_client [req-5cdc90b7-e13f-4389-bab7-792e241232ec ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5cdc90b7-e13f-4389-bab7-792e241232ec', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/3ad453ba4c73411594153bbbd96ac0ab'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.819 41 INFO tempest.lib.common.rest_client [req-79619f5d-6cae-4498-9ea5-deca3c53d655 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.046s 2020-12-05 13:23:51.820 41 DEBUG tempest.lib.common.rest_client [req-79619f5d-6cae-4498-9ea5-deca3c53d655 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-79619f5d-6cae-4498-9ea5-deca3c53d655', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.891 38 INFO tempest.lib.common.rest_client [req-444e34a9-9dd9-4531-aa71-c403b9b84d5d ] Request (ImagesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:23:51.892 38 DEBUG tempest.lib.common.rest_client [req-444e34a9-9dd9-4531-aa71-c403b9b84d5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-444e34a9-9dd9-4531-aa71-c403b9b84d5d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["6Wzq4ZK5R0y_mLUiVMlcEQ"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.894 39 INFO tempest.lib.common.rest_client [req-4cf22e9c-7a58-4900-beb6-afa7a298b3b7 ] Request (HypervisorRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:51.895 39 DEBUG tempest.lib.common.rest_client [req-4cf22e9c-7a58-4900-beb6-afa7a298b3b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4cf22e9c-7a58-4900-beb6-afa7a298b3b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["57TjfychQv2zbUeKzEwchQ"], "expires_at": "2020-12-05T14:23:51.000000Z", "issued_at": "2020-12-05T13:23:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.938 41 INFO tempest.lib.common.rest_client [req-4279cef9-1631-43ed-8c8f-fb38d4647cad ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.117s 2020-12-05 13:23:51.938 41 DEBUG tempest.lib.common.rest_client [req-4279cef9-1631-43ed-8c8f-fb38d4647cad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4279cef9-1631-43ed-8c8f-fb38d4647cad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.939 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:51.939 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:51.976 40 INFO tempest.lib.common.rest_client [req-65b85deb-08e0-492c-b45d-5c9280f7e345 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.351s 2020-12-05 13:23:51.977 40 DEBUG tempest.lib.common.rest_client [req-65b85deb-08e0-492c-b45d-5c9280f7e345 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '21', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-65b85deb-08e0-492c-b45d-5c9280f7e345', 'x-compute-request-id': 'req-65b85deb-08e0-492c-b45d-5c9280f7e345', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"flavor_access": []}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:51.980 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:51.992 41 INFO tempest.lib.common.rest_client [req-d5df07fe-5351-48bb-9e3e-0d8e37444052 ] Request (KeypairsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.051s 2020-12-05 13:23:51.992 41 DEBUG tempest.lib.common.rest_client [req-d5df07fe-5351-48bb-9e3e-0d8e37444052 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d5df07fe-5351-48bb-9e3e-0d8e37444052', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.031 40 INFO tempest.lib.common.rest_client [req-27a8ee24-8c8a-42fb-be6d-a3709453270d ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 200 GET http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles 0.050s 2020-12-05 13:23:52.032 40 DEBUG tempest.lib.common.rest_client [req-27a8ee24-8c8a-42fb-be6d-a3709453270d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27a8ee24-8c8a-42fb-be6d-a3709453270d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493/users/16debb40aeb247f884f17975ad785956/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.051 41 INFO tempest.lib.common.rest_client [req-8d06e0e4-c8cb-44da-9b3d-2d5dac62a2a0 ] Request (KeypairsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles/72a4576c553448cd941b052c1ca0cf2d 0.058s 2020-12-05 13:23:52.052 41 DEBUG tempest.lib.common.rest_client [req-8d06e0e4-c8cb-44da-9b3d-2d5dac62a2a0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8d06e0e4-c8cb-44da-9b3d-2d5dac62a2a0', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.065 39 INFO tempest.lib.common.rest_client [req-d824f809-04ee-4dad-bcf8-3c2dc80c6835 ] Request (HypervisorRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.168s 2020-12-05 13:23:52.066 39 DEBUG tempest.lib.common.rest_client [req-d824f809-04ee-4dad-bcf8-3c2dc80c6835 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:51 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d824f809-04ee-4dad-bcf8-3c2dc80c6835', 'x-compute-request-id': 'req-d824f809-04ee-4dad-bcf8-3c2dc80c6835', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.071 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:52.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.076 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.077 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.078 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.079 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.079 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.079 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.080 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.080 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.080 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.080 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.081 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.081 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.081 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.082 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.082 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.082 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.083 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.083 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.083 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.084 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.084 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.084 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.085 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.086 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.087 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.088 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.089 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.090 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.091 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.092 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.093 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.094 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.095 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.096 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:list, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:52.096 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:52.123 40 INFO tempest.lib.common.rest_client [req-fc788f95-9e1d-4f64-a7af-3bb90a13c3b7 ] Request (FlavorAccessRbacTest:test_remove_flavor_access): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:52.123 40 DEBUG tempest.lib.common.rest_client [req-fc788f95-9e1d-4f64-a7af-3bb90a13c3b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fc788f95-9e1d-4f64-a7af-3bb90a13c3b7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "16debb40aeb247f884f17975ad785956", "name": "tempest-FlavorAccessRbacTest-1935815641", "password_expires_at": null}, "audit_ids": ["cCwzVVkKSGqyWalmPnoOZQ"], "expires_at": "2020-12-05T14:23:52.000000Z", "issued_at": "2020-12-05T13:23:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21dadce4be4f4477a4724873bc2c6493", "name": "tempest-FlavorAccessRbacTest-1935815641"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21dadce4be4f4477a4724873bc2c6493", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.169 41 INFO tempest.lib.common.rest_client [req-284b7370-ce19-4abf-92f4-295ac028a4a7 ] Request (KeypairsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles/a629c95d64b3416fb80ae90af4f69c05 0.116s 2020-12-05 13:23:52.169 41 DEBUG tempest.lib.common.rest_client [req-284b7370-ce19-4abf-92f4-295ac028a4a7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-284b7370-ce19-4abf-92f4-295ac028a4a7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.219 39 INFO tempest.lib.common.rest_client [req-e6160001-2041-496f-a292-357ec96b9c53 ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.121s 2020-12-05 13:23:52.219 39 DEBUG tempest.lib.common.rest_client [req-e6160001-2041-496f-a292-357ec96b9c53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6160001-2041-496f-a292-357ec96b9c53', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.314 39 INFO tempest.lib.common.rest_client [req-dc838706-ed41-4c2a-a2f6-62e4d0dcf864 ] Request (HypervisorRbacTest:test_list_hypervisors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-05 13:23:52.314 39 DEBUG tempest.lib.common.rest_client [req-dc838706-ed41-4c2a-a2f6-62e4d0dcf864 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc838706-ed41-4c2a-a2f6-62e4d0dcf864', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["a-X79zHMS9WeCKP1VDWlow"], "expires_at": "2020-12-05T14:23:52.000000Z", "issued_at": "2020-12-05T13:23:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.426 39 INFO tempest.lib.common.rest_client [req-6db1c906-d203-4155-ae7c-0e5373554385 ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.111s 2020-12-05 13:23:52.427 39 DEBUG tempest.lib.common.rest_client [req-6db1c906-d203-4155-ae7c-0e5373554385 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-6db1c906-d203-4155-ae7c-0e5373554385', 'x-compute-request-id': 'req-6db1c906-d203-4155-ae7c-0e5373554385', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.431 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:52.461 40 INFO tempest.lib.common.rest_client [req-ff32efe8-db26-4659-96ea-6408052e38d4 ] Request (FlavorAccessRbacTest:_run_cleanups): 404 POST http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action 0.337s 2020-12-05 13:23:52.462 40 DEBUG tempest.lib.common.rest_client [req-ff32efe8-db26-4659-96ea-6408052e38d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"removeTenantAccess": {"tenant": "21dadce4be4f4477a4724873bc2c6493"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '126', 'x-openstack-request-id': 'req-ff32efe8-db26-4659-96ea-6408052e38d4', 'x-compute-request-id': 'req-ff32efe8-db26-4659-96ea-6408052e38d4', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821/action'} Body: b'{"itemNotFound": {"code": 404, "message": "Flavor access not found for 7745 / 21dadce4be4f4477a4724873bc2c6493 combination."}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.499 40 INFO tempest.lib.common.rest_client [req-250d4d04-cea7-4da1-9f1d-c7c7fe984a13 ] Request (FlavorAccessRbacTest:tearDownClass): 202 DELETE http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821 0.032s 2020-12-05 13:23:52.500 40 DEBUG tempest.lib.common.rest_client [req-250d4d04-cea7-4da1-9f1d-c7c7fe984a13 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-250d4d04-cea7-4da1-9f1d-c7c7fe984a13', 'x-compute-request-id': 'req-250d4d04-cea7-4da1-9f1d-c7c7fe984a13', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/a7187696-4d3a-437d-8e0d-2bc5cea20821'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.529 40 INFO tempest.lib.common.rest_client [req-58f30f4f-475a-4d90-ac39-3413d1ce5157 ] Request (FlavorAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94/compute/v2.1/flavors/detail 0.028s 2020-12-05 13:23:52.529 40 DEBUG tempest.lib.common.rest_client [req-58f30f4f-475a-4d90-ac39-3413d1ce5157 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '8775', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-58f30f4f-475a-4d90-ac39-3413d1ce5157', 'x-compute-request-id': 'req-58f30f4f-475a-4d90-ac39-3413d1ce5157', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/flavors/detail'} Body: b'{"flavors": [{"id": "010a6385-3d37-479f-8924-349c195d1429", "name": "patrole_admin-flavor_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/010a6385-3d37-479f-8924-349c195d1429"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/010a6385-3d37-479f-8924-349c195d1429"}]}, {"id": "056424e1-8ec9-40e7-8c57-c819c5871f0e", "name": "patrole_admin-flavor_alt_5d1be12f-6601-44bc-a12c-cf21fb2acad3", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/056424e1-8ec9-40e7-8c57-c819c5871f0e"}]}, {"id": "05676930-0cf0-4112-96d5-c20d9d968784", "name": "tempest_slow-flavor_alt_46c19aff-5cee-4258-8d4b-e8dc6a1b2197", "ram": 1024, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/05676930-0cf0-4112-96d5-c20d9d968784"}]}, {"id": "0c1f2caa-cd64-454f-aac1-d85149f62f69", "name": "rally_verify_1bb95e6a_rwMloXB6", "ram": 64, "disk": 5, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/0c1f2caa-cd64-454f-aac1-d85149f62f69"}]}, {"id": "1", "name": "m1.tiny", "ram": 512, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/1"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/1"}]}, {"id": "2", "name": "m1.small", "ram": 2048, "disk": 20, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/2"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/2"}]}, {"id": "29b55520-b9a3-4b97-a3ae-d9c83f854c93", "name": "m1.heat_micro", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/29b55520-b9a3-4b97-a3ae-d9c83f854c93"}]}, {"id": "3", "name": "m1.medium", "ram": 4096, "disk": 40, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/3"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/3"}]}, {"id": "4", "name": "m1.large", "ram": 8192, "disk": 80, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 4, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/flavors/4"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/4"}]}, {"id": "42", "name": "m1.nano", "ram": 128, "disk": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 1, "os-flavor-access:is_public _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.540 39 INFO tempest.lib.common.rest_client [req-e927c8a4-d008-4b44-958a-f20d78a73ede ] Request (HypervisorRbacTest:test_list_hypervisors): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.108s 2020-12-05 13:23:52.541 39 DEBUG tempest.lib.common.rest_client [req-e927c8a4-d008-4b44-958a-f20d78a73ede ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e927c8a4-d008-4b44-958a-f20d78a73ede', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.575 39 INFO tempest.lib.common.rest_client [req-30845afd-785e-4513-a5b3-0c14798bf761 ] Request (HypervisorRbacTest:test_list_hypervisors): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:52.576 39 DEBUG tempest.lib.common.rest_client [req-30845afd-785e-4513-a5b3-0c14798bf761 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-30845afd-785e-4513-a5b3-0c14798bf761', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["nJUyfjgDQKi-XVeKWYMapg"], "expires_at": "2020-12-05T14:23:52.000000Z", "issued_at": "2020-12-05T13:23:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.581 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:52.581 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.582 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.582 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.582 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.583 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.583 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.584 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.584 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.584 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.585 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.585 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.585 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.586 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.586 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.586 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.586 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.587 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.587 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.587 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.588 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.588 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.588 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.589 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.589 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.589 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.589 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.590 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.590 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.590 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.591 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.591 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.591 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.591 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.592 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.593 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.593 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.593 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.594 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.594 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.594 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.595 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.596 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.596 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.596 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.597 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.597 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.597 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.598 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.599 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.600 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.600 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.600 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.601 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.602 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.603 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.604 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:52.605 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:list-detail, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:52.605 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:52.663 39 INFO tempest.lib.common.rest_client [req-20be9a43-7796-4dae-be79-e3a1cfa271b8 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.057s 2020-12-05 13:23:52.664 39 DEBUG tempest.lib.common.rest_client [req-20be9a43-7796-4dae-be79-e3a1cfa271b8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20be9a43-7796-4dae-be79-e3a1cfa271b8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.672 40 INFO tempest.lib.common.rest_client [req-4dc7dbe8-f89e-45c7-8923-064d63fcdb35 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/16debb40aeb247f884f17975ad785956 0.134s 2020-12-05 13:23:52.673 40 DEBUG tempest.lib.common.rest_client [req-4dc7dbe8-f89e-45c7-8923-064d63fcdb35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4dc7dbe8-f89e-45c7-8923-064d63fcdb35', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/16debb40aeb247f884f17975ad785956'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.748 39 INFO tempest.lib.common.rest_client [req-fe7409e2-3fdd-46c5-b354-8d38344ad075 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:52.749 39 DEBUG tempest.lib.common.rest_client [req-fe7409e2-3fdd-46c5-b354-8d38344ad075 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe7409e2-3fdd-46c5-b354-8d38344ad075', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["ra5UJU__TEaZ4VQsSUyzaQ"], "expires_at": "2020-12-05T14:23:52.000000Z", "issued_at": "2020-12-05T13:23:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.767 40 INFO tempest.lib.common.rest_client [req-9edf4499-d8d9-406b-8e91-91ec6de304df ] Request (FlavorAccessRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-05 13:23:52.767 40 DEBUG tempest.lib.common.rest_client [req-9edf4499-d8d9-406b-8e91-91ec6de304df ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9edf4499-d8d9-406b-8e91-91ec6de304df', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["_TOvQqG7QlSiY1E04VzcMg"], "expires_at": "2020-12-05T14:23:52.000000Z", "issued_at": "2020-12-05T13:23:52.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.931 39 INFO tempest.lib.common.rest_client [req-0dca0558-b3bb-47b8-a7fe-10b7e722fc5d ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/detail 0.180s 2020-12-05 13:23:52.932 39 DEBUG tempest.lib.common.rest_client [req-0dca0558-b3bb-47b8-a7fe-10b7e722fc5d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '3115', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0dca0558-b3bb-47b8-a7fe-10b7e722fc5d', 'x-compute-request-id': 'req-0dca0558-b3bb-47b8-a7fe-10b7e722fc5d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/detail'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1536, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62776, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 64, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 2, "memory_mb_used": 1536, "local_gb_used": 2, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62776, "free_disk_gb": 98, "current_workload": 0, "running_vms": 1, "disk_available_least": 64, "host_ip": "172.30.13.93", "service": {"id": 3, "host": "lf-virtual8", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"f16c\\", \\"xsave\\", \\"pclmuldq\\", \\"rdtscp\\", \\"ds_cpl\\", \\"pdcm\\", \\"lm\\", \\"sse\\", \\"erms\\", \\"3dnowprefetch\\", \\"pdpe1gb\\", \\"adx\\", \\"apic\\", \\"ssse3\\", \\"bmi1\\", \\"stibp\\", \\"invpcid\\", \\"mmx\\", \\"avx2\\", \\"intel-pt\\", \\"pse36\\", \\"rdrand\\", \\"vmx\\", \\"pcid\\", \\"cx8\\", \\"est\\", \\"tsc-deadline\\", \\"cx16\\", \\"vme\\", \\"pni\\", \\"acpi\\", \\"pse\\", \\"x2apic\\", \\"dtes64\\", \\"de\\", \\"rtm\\", \\"smep\\", \\"mce\\", \\"ssbd\\", \\"xtpr\\", \\"monitor\\", \\"tsc\\", \\"xsaveopt\\", \\"movbe\\", \\"spec-ctrl\\", \\"osxsave\\", \\"ht\\", \\"tm\\", \\"arat\\", \\"abm\\", \\"smx\\", \\"fxsr\\", \\"pbe\\", \\"clflush\\", \\"ds\\", \\"md-clear\\", \\"ss\\", \\"sse4.1\\", \\"invtsc\\", \\"popcnt\\", \\"sse2\\", \\"sse4.2\\", \\"fpu\\", \\"fsgsbase\\", \\"smap\\", \\"pae\\", \\"aes\\", \\"avx\\", \\"tsc_adjust\\", \\"pge\\", \\"nx\\", \\"rdseed\\", \\"lahf_lm\\", \\"cmov\\", \\"fma\\", \\"msr\\", \\"tm2\\", \\"bmi2\\", \\"mtrr\\", \\"dca\\", \\"mca\\", \\"hle\\", \\"pat\\", \\"sep\\", \\"syscall\\"]}"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:52.942 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.004 39 INFO tempest.lib.common.rest_client [req-e389c65f-aa02-4fe4-ab08-96f5f0cdb156 ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.061s 2020-12-05 13:23:53.005 39 DEBUG tempest.lib.common.rest_client [req-e389c65f-aa02-4fe4-ab08-96f5f0cdb156 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:52 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e389c65f-aa02-4fe4-ab08-96f5f0cdb156', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.042 39 INFO tempest.lib.common.rest_client [req-ff4862ab-f5ca-4b14-a7c5-bdb28fff4a6c ] Request (HypervisorRbacTest:test_list_hypervisors_with_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:23:53.043 39 DEBUG tempest.lib.common.rest_client [req-ff4862ab-f5ca-4b14-a7c5-bdb28fff4a6c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff4862ab-f5ca-4b14-a7c5-bdb28fff4a6c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["BauWBmkGSBK5PZpyqmS5aA"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.048 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:53.049 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.050 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.051 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.051 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.052 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.053 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.053 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.054 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.054 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.055 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.056 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.056 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.057 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.058 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.059 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.060 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.061 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.061 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.061 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.062 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.063 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.064 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.065 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.066 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.067 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.068 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.069 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.069 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.069 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.070 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.070 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.070 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.071 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.072 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.073 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.074 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.075 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.076 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:53.077 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.079 40 INFO tempest.lib.common.rest_client [req-0dcb4e28-30bd-4aec-be73-db35ebec4709 ] Request (FlavorAccessRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21dadce4be4f4477a4724873bc2c6493&name=default 0.310s 2020-12-05 13:23:53.079 40 DEBUG tempest.lib.common.rest_client [req-0dcb4e28-30bd-4aec-be73-db35ebec4709 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-0dcb4e28-30bd-4aec-be73-db35ebec4709', 'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21dadce4be4f4477a4724873bc2c6493&name=default'} Body: b'{"security_groups": [{"id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "name": "default", "stateful": true, "tenant_id": "21dadce4be4f4477a4724873bc2c6493", "description": "Default security group", "security_group_rules": [{"id": "22109d0d-ee25-48e6-b342-bfde37640085", "tenant_id": "21dadce4be4f4477a4724873bc2c6493", "security_group_id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "21dadce4be4f4477a4724873bc2c6493"}, {"id": "53f7a083-9680-4b2f-8549-9cadc3db93ed", "tenant_id": "21dadce4be4f4477a4724873bc2c6493", "security_group_id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "21dadce4be4f4477a4724873bc2c6493"}, {"id": "a2cbfd6a-86d3-4372-b4b4-d025fd8ed7b7", "tenant_id": "21dadce4be4f4477a4724873bc2c6493", "security_group_id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "21dadce4be4f4477a4724873bc2c6493"}, {"id": "b77357fb-af9b-4536-ac33-4db2e332414c", "tenant_id": "21dadce4be4f4477a4724873bc2c6493", "security_group_id": "00d9af3f-57e1-4fdf-8d29-ce76638ec772", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "21dadce4be4f4477a4724873bc2c6493"}], "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 1, "project_id": "21dadce4be4f4477a4724873bc2c6493"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.136 39 INFO tempest.lib.common.rest_client [req-5aa7d6fc-7a0e-4294-82d3-ddaab6a716c7 ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.058s 2020-12-05 13:23:53.136 39 DEBUG tempest.lib.common.rest_client [req-5aa7d6fc-7a0e-4294-82d3-ddaab6a716c7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5aa7d6fc-7a0e-4294-82d3-ddaab6a716c7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.168 39 INFO tempest.lib.common.rest_client [req-f09cb307-a43b-47c2-ae85-6b82eaae12ff ] Request (HypervisorRbacTest:test_show_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:53.169 39 DEBUG tempest.lib.common.rest_client [req-f09cb307-a43b-47c2-ae85-6b82eaae12ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f09cb307-a43b-47c2-ae85-6b82eaae12ff', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["8zKQUqFDQ5KDH91h0W9Gzg"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.219 40 INFO tempest.lib.common.rest_client [req-fd46af9a-4922-4e4c-9342-4bf67decab24 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/00d9af3f-57e1-4fdf-8d29-ce76638ec772 0.138s 2020-12-05 13:23:53.220 40 DEBUG tempest.lib.common.rest_client [req-fd46af9a-4922-4e4c-9342-4bf67decab24 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-fd46af9a-4922-4e4c-9342-4bf67decab24', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/00d9af3f-57e1-4fdf-8d29-ce76638ec772'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.259 41 INFO tempest.lib.common.rest_client [req-a727012d-58c5-4407-9d3b-d54844f234e7 ] Request (KeypairsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:53.259 41 DEBUG tempest.lib.common.rest_client [req-a727012d-58c5-4407-9d3b-d54844f234e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a727012d-58c5-4407-9d3b-d54844f234e7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["ma8hKrofTJS3o1AkaCTPJg"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.262 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:53.263 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.263 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.264 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.264 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.265 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.265 39 INFO tempest.lib.common.rest_client [req-f9531436-df7e-4efa-994a-2381069843ee ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/1 0.095s 2020-12-05 13:23:53.265 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.266 39 DEBUG tempest.lib.common.rest_client [req-f9531436-df7e-4efa-994a-2381069843ee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1563', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f9531436-df7e-4efa-994a-2381069843ee', 'x-compute-request-id': 'req-f9531436-df7e-4efa-994a-2381069843ee', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/1'} Body: b'{"hypervisor": {"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "vcpus": 88, "memory_mb": 64312, "local_gb": 100, "vcpus_used": 1, "memory_mb_used": 1536, "local_gb_used": 1, "hypervisor_type": "QEMU", "hypervisor_version": 4000000, "free_ram_mb": 62776, "free_disk_gb": 99, "current_workload": 0, "running_vms": 1, "disk_available_least": 64, "host_ip": "172.30.13.94", "service": {"id": 2, "host": "lf-virtual9", "disabled_reason": null}, "cpu_info": "{\\"arch\\": \\"x86_64\\", \\"model\\": \\"Broadwell-IBRS\\", \\"vendor\\": \\"Intel\\", \\"topology\\": {\\"cells\\": 2, \\"sockets\\": 1, \\"cores\\": 22, \\"threads\\": 2}, \\"features\\": [\\"fxsr\\", \\"syscall\\", \\"hle\\", \\"aes\\", \\"cx16\\", \\"avx2\\", \\"cmov\\", \\"smap\\", \\"pse\\", \\"ssse3\\", \\"xsave\\", \\"f16c\\", \\"rdrand\\", \\"vmx\\", \\"smx\\", \\"apic\\", \\"bmi2\\", \\"tsc_adjust\\", \\"rdtscp\\", \\"osxsave\\", \\"mca\\", \\"vme\\", \\"rdseed\\", \\"monitor\\", \\"spec-ctrl\\", \\"dtes64\\", \\"erms\\", \\"rtm\\", \\"invpcid\\", \\"popcnt\\", \\"pat\\", \\"x2apic\\", \\"pae\\", \\"ssbd\\", \\"arat\\", \\"ss\\", \\"tsc-deadline\\", \\"ds_cpl\\", \\"bmi1\\", \\"pcid\\", \\"pdpe1gb\\", \\"invtsc\\", \\"cx8\\", \\"dca\\", \\"smep\\", \\"mce\\", \\"ht\\", \\"fsgsbase\\", \\"intel-pt\\", \\"fma\\", \\"md-clear\\", \\"pge\\", \\"adx\\", \\"est\\", \\"lm\\", \\"abm\\", \\"lahf_lm\\", \\"acpi\\", \\"sse2\\", \\"tm2\\", \\"pni\\", \\"ds\\", \\"clflush\\", \\"xtpr\\", \\"msr\\", \\"sep\\", \\"pdcm\\", \\"tm\\", \\"nx\\", \\"sse4.1\\", \\"xsaveopt\\", \\"de\\", \\"tsc\\", \\"stibp\\", \\"3dnowprefetch\\", \\"sse4.2\\", \\"avx\\", \\"pbe\\", \\"pse36\\", \\"mmx\\", \\"pclmuldq\\", \\"mtrr\\", \\"movbe\\", \\"sse\\", \\"fpu\\"]}"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.266 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.266 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.267 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.267 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.268 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.268 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.269 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.269 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.269 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.270 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.270 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.271 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.271 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.272 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.272 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.273 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.273 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.273 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.273 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.274 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.274 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.274 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.275 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.275 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.275 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.275 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.275 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.276 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.276 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.276 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.277 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.277 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.277 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.277 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.278 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.278 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.278 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.279 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.279 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.279 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.280 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.280 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.280 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.280 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.281 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.282 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.282 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.282 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.282 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.283 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.283 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.283 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.284 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.284 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.284 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.285 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.285 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.286 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.286 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.286 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.286 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.287 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.287 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.287 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.288 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.288 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.288 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.288 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.289 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.289 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.291 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:create, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:53.291 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.335 39 INFO tempest.lib.common.rest_client [req-035c863b-0b26-4bbd-85e0-c829021292d6 ] Request (HypervisorRbacTest:test_show_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.059s 2020-12-05 13:23:53.336 39 DEBUG tempest.lib.common.rest_client [req-035c863b-0b26-4bbd-85e0-c829021292d6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-035c863b-0b26-4bbd-85e0-c829021292d6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.347 40 INFO tempest.lib.common.rest_client [req-3082c671-d428-4f81-8067-e430346dd2c6 ] Request (FlavorAccessRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493 0.126s 2020-12-05 13:23:53.348 40 DEBUG tempest.lib.common.rest_client [req-3082c671-d428-4f81-8067-e430346dd2c6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3082c671-d428-4f81-8067-e430346dd2c6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21dadce4be4f4477a4724873bc2c6493'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.386 41 INFO tempest.lib.common.rest_client [req-c022fece-a30b-46b2-9ba7-1ee13b985488 ] Request (KeypairsRbacTest:test_create_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.094s 2020-12-05 13:23:53.387 41 DEBUG tempest.lib.common.rest_client [req-c022fece-a30b-46b2-9ba7-1ee13b985488 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c022fece-a30b-46b2-9ba7-1ee13b985488', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.390 40 INFO tempest.lib.common.rest_client [req-bd8b8891-3115-4623-834b-5824f6655c5e ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:53.391 40 DEBUG tempest.lib.common.rest_client [req-bd8b8891-3115-4623-834b-5824f6655c5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd8b8891-3115-4623-834b-5824f6655c5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["60n74WKIQPerq4VOfalgQg"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.431 40 INFO tempest.lib.common.rest_client [req-f702533d-fdac-4b8e-8af0-e68ff2365a26 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:53.432 40 DEBUG tempest.lib.common.rest_client [req-f702533d-fdac-4b8e-8af0-e68ff2365a26 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f702533d-fdac-4b8e-8af0-e68ff2365a26', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["zcOk4RDiRx6pJgP4Hqj7RA"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.441 39 INFO tempest.lib.common.rest_client [req-45f36a79-cf60-44d4-b9a6-8be623b58df6 ] Request (HypervisorRbacTest:test_show_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-05 13:23:53.441 39 DEBUG tempest.lib.common.rest_client [req-45f36a79-cf60-44d4-b9a6-8be623b58df6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-45f36a79-cf60-44d4-b9a6-8be623b58df6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["c2tp71gKSM-345rfplw5KA"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.446 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:53.447 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.447 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.448 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.448 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.448 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.449 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.449 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.449 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.450 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.450 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.450 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.451 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.451 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.451 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.451 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.452 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.452 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.452 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.452 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.453 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.453 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.453 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.454 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.454 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.454 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.454 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.455 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.455 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.455 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.456 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.456 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.456 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.456 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.457 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.457 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.457 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.457 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.458 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.458 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.458 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.459 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.459 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.459 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.459 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.460 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.460 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.460 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.461 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.461 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.461 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.462 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.462 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.462 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.462 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.463 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.463 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.463 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.463 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.464 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.464 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.465 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.465 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.465 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.466 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.466 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.466 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.466 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.467 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.467 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.467 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.468 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.468 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.468 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.468 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.469 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.470 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:statistics, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:53.470 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.478 41 INFO tempest.lib.common.rest_client [req-fe65a8f6-1cea-4776-ad88-ccb3b0b888a3 ] Request (KeypairsRbacTest:test_create_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-05 13:23:53.479 41 DEBUG tempest.lib.common.rest_client [req-fe65a8f6-1cea-4776-ad88-ccb3b0b888a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fe65a8f6-1cea-4776-ad88-ccb3b0b888a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["L17acTXzRaygKoGVlA7N1g"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.487 40 INFO tempest.lib.common.rest_client [req-819cadeb-1af4-40bc-99cb-338c47b01520 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-12-05 13:23:53.487 40 DEBUG tempest.lib.common.rest_client [req-819cadeb-1af4-40bc-99cb-338c47b01520 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-819cadeb-1af4-40bc-99cb-338c47b01520', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.522 39 INFO tempest.lib.common.rest_client [req-9eb65da5-c550-4a4d-a1ea-ac4c4cb73a7d ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.051s 2020-12-05 13:23:53.522 39 DEBUG tempest.lib.common.rest_client [req-9eb65da5-c550-4a4d-a1ea-ac4c4cb73a7d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9eb65da5-c550-4a4d-a1ea-ac4c4cb73a7d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.548 40 INFO tempest.lib.common.rest_client [req-bd7149f4-aeaf-4a34-957d-73b22fdfc272 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.059s 2020-12-05 13:23:53.548 40 DEBUG tempest.lib.common.rest_client [req-bd7149f4-aeaf-4a34-957d-73b22fdfc272 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FlavorRxtxRbacTest-1101470792-desc", "domain_id": "default", "name": "tempest-FlavorRxtxRbacTest-1101470792"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bd7149f4-aeaf-4a34-957d-73b22fdfc272', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "bd735af706a344bfa0370581d7cb2036", "name": "tempest-FlavorRxtxRbacTest-1101470792", "domain_id": "default", "description": "tempest-FlavorRxtxRbacTest-1101470792-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.620 39 INFO tempest.lib.common.rest_client [req-3fa1976d-166d-4222-b539-ee1c06c2fb8a ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-05 13:23:53.621 39 DEBUG tempest.lib.common.rest_client [req-3fa1976d-166d-4222-b539-ee1c06c2fb8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3fa1976d-166d-4222-b539-ee1c06c2fb8a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["dVoXYDDjR1i5gexhIY28MQ"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.652 40 INFO tempest.lib.common.rest_client [req-5ed5c7ff-d830-4d04-9959-770aefe1b220 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.102s 2020-12-05 13:23:53.652 40 DEBUG tempest.lib.common.rest_client [req-5ed5c7ff-d830-4d04-9959-770aefe1b220 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FlavorRxtxRbacTest-1101470792", "password": "A1~sxCh%~uxMXx=", "project_id": "bd735af706a344bfa0370581d7cb2036", "email": "tempest-FlavorRxtxRbacTest-11193596@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '390', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5ed5c7ff-d830-4d04-9959-770aefe1b220', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "bd735af706a344bfa0370581d7cb2036", "email": "tempest-FlavorRxtxRbacTest-11193596@example.com", "id": "50b2a27a35b24d9d92c7f1a9d401ae6e", "name": "tempest-FlavorRxtxRbacTest-1101470792", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/50b2a27a35b24d9d92c7f1a9d401ae6e"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.704 40 INFO tempest.lib.common.rest_client [req-e46da983-c451-4f9b-8508-0eddea67023f ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-05 13:23:53.705 40 DEBUG tempest.lib.common.rest_client [req-e46da983-c451-4f9b-8508-0eddea67023f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e46da983-c451-4f9b-8508-0eddea67023f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.721 39 INFO tempest.lib.common.rest_client [req-694ba3ed-edff-40d5-8845-f1433345b379 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/statistics 0.098s 2020-12-05 13:23:53.722 39 DEBUG tempest.lib.common.rest_client [req-694ba3ed-edff-40d5-8845-f1433345b379 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '266', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-694ba3ed-edff-40d5-8845-f1433345b379', 'x-compute-request-id': 'req-694ba3ed-edff-40d5-8845-f1433345b379', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/statistics'} Body: b'{"hypervisor_statistics": {"count": 2, "vcpus": 176, "memory_mb": 128624, "local_gb": 200, "vcpus_used": 3, "memory_mb_used": 3072, "local_gb_used": 3, "free_ram_mb": 125552, "free_disk_gb": 197, "current_workload": 0, "running_vms": 2, "disk_available_least": 128}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.727 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.752 40 INFO tempest.lib.common.rest_client [req-0773bf89-9146-4cd6-874b-7d1c5684b026 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.046s 2020-12-05 13:23:53.752 40 DEBUG tempest.lib.common.rest_client [req-0773bf89-9146-4cd6-874b-7d1c5684b026 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0773bf89-9146-4cd6-874b-7d1c5684b026', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.792 39 INFO tempest.lib.common.rest_client [req-777678e3-694d-4f72-8513-427bd3a8092f ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.063s 2020-12-05 13:23:53.792 39 DEBUG tempest.lib.common.rest_client [req-777678e3-694d-4f72-8513-427bd3a8092f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-777678e3-694d-4f72-8513-427bd3a8092f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.819 40 INFO tempest.lib.common.rest_client [req-ddb28f46-8818-4a30-95e2-5b17cca20c88 ] Request (FlavorRxtxRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-05 13:23:53.820 40 DEBUG tempest.lib.common.rest_client [req-ddb28f46-8818-4a30-95e2-5b17cca20c88 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ddb28f46-8818-4a30-95e2-5b17cca20c88', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.820 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorRxtxRbacTest-1101470792', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'bd735af706a344bfa0370581d7cb2036', 'project_name': 'tempest-FlavorRxtxRbacTest-1101470792', 'tenant_id': 'bd735af706a344bfa0370581d7cb2036', 'tenant_name': 'tempest-FlavorRxtxRbacTest-1101470792', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '50b2a27a35b24d9d92c7f1a9d401ae6e'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:53.821 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FlavorRxtxRbacTest-1101470792', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'bd735af706a344bfa0370581d7cb2036', 'project_name': 'tempest-FlavorRxtxRbacTest-1101470792', 'tenant_id': 'bd735af706a344bfa0370581d7cb2036', 'tenant_name': 'tempest-FlavorRxtxRbacTest-1101470792', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '50b2a27a35b24d9d92c7f1a9d401ae6e'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:53.880 39 INFO tempest.lib.common.rest_client [req-323584e2-4c06-4f54-bbec-e5f32be732c3 ] Request (HypervisorRbacTest:test_show_hypervisor_statistics): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.086s 2020-12-05 13:23:53.880 39 DEBUG tempest.lib.common.rest_client [req-323584e2-4c06-4f54-bbec-e5f32be732c3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-323584e2-4c06-4f54-bbec-e5f32be732c3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["j-GTPKt5SOy3-WpmImQkMA"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:53.885 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:53.885 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.886 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.887 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.888 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.889 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.890 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.891 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.892 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.893 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.894 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.895 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.896 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.897 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.898 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.899 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.900 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.901 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.902 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.903 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.904 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.905 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.906 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.907 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.908 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:53.909 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:uptime, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:53.909 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:53.948 40 INFO tempest.lib.common.rest_client [req-ba76b829-0e28-484b-86d1-7ac56dee3ee7 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.115s 2020-12-05 13:23:53.948 40 DEBUG tempest.lib.common.rest_client [req-ba76b829-0e28-484b-86d1-7ac56dee3ee7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ba76b829-0e28-484b-86d1-7ac56dee3ee7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "50b2a27a35b24d9d92c7f1a9d401ae6e", "name": "tempest-FlavorRxtxRbacTest-1101470792", "password_expires_at": null}, "audit_ids": ["yJ_O5E74Q_y6HaZ7_ap_Gw"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd735af706a344bfa0370581d7cb2036", "name": "tempest-FlavorRxtxRbacTest-1101470792"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.021 39 INFO tempest.lib.common.rest_client [req-cf393eee-6f5a-4650-8d60-5057b6a4b94f ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.110s 2020-12-05 13:23:54.021 39 DEBUG tempest.lib.common.rest_client [req-cf393eee-6f5a-4650-8d60-5057b6a4b94f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf393eee-6f5a-4650-8d60-5057b6a4b94f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.038 40 INFO tempest.lib.common.rest_client [req-4d6b22cf-eb01-4766-8dc8-eb1875b8c57f ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:23:54.039 40 DEBUG tempest.lib.common.rest_client [req-4d6b22cf-eb01-4766-8dc8-eb1875b8c57f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4d6b22cf-eb01-4766-8dc8-eb1875b8c57f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["KM4zVe59QwuWcnYKm5o1UA"], "expires_at": "2020-12-05T14:23:53.000000Z", "issued_at": "2020-12-05T13:23:53.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.040 41 INFO tempest.lib.common.rest_client [req-edbc2217-a72c-4dce-8140-e5b79e870a02 ] Request (KeypairsRbacTest:test_create_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.559s 2020-12-05 13:23:54.041 41 DEBUG tempest.lib.common.rest_client [req-edbc2217-a72c-4dce-8140-e5b79e870a02 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-209850077"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:53 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2313', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-edbc2217-a72c-4dce-8140-e5b79e870a02', 'x-compute-request-id': 'req-edbc2217-a72c-4dce-8140-e5b79e870a02', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\n2KclcnyCwa6o1lIj7YmziicgaNzCBJ71sJbaTpq6EnZom0qiMQH9\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-209850077", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiN7/uY9UVOVRDc43bbtGUADhsEMD1RhwA7ffn8j7RzgMlF/BkgEgVNyL+IxQOC3RDrq9/LcY8uR1IC7PjRxcy9RQkpAbh92c0/mm9uOEA0U2pajD5o9uyz5hR3kpCp1IpGY0u1ScdCzDjM9oJqYuKHVsBP1M+VeYFLOROqfi91ReOWIeADsaLksD0s2f3Bafj4fMSkUj56FglPHhjzZW/tYbjhF/BmPtjZK7aiVsUiD3q0CAIxY9Nzu3ACCImBM711dcPn55vqJp7nf8oKve5V4ThKRHuBAOIxJRs6zEb7TJ3LTQ+4lFikjtLQQarXnthXRaeRvZydeNQvuz3DXD5 Generated-by-Nova", "fingerprint": "39:b2:f9:0b:6c:ed:2c:e9:25:2b:04:dd:5e:75:82:18", "user_id": "fc1ac36dc4c74d21abba4bc0d6883d41"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.046 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:54.060 39 INFO tempest.lib.common.rest_client [req-a6cdf35b-ec63-4c2f-ab22-e129957c27ce ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:23:54.061 39 DEBUG tempest.lib.common.rest_client [req-a6cdf35b-ec63-4c2f-ab22-e129957c27ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a6cdf35b-ec63-4c2f-ab22-e129957c27ce', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["ylgMgweqSCWHZKGyvGfVrw"], "expires_at": "2020-12-05T14:23:54.000000Z", "issued_at": "2020-12-05T13:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.084 40 INFO tempest.lib.common.rest_client [req-ec187db0-f4f6-4d89-ac9d-c44aa93dfafa ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:54.085 40 DEBUG tempest.lib.common.rest_client [req-ec187db0-f4f6-4d89-ac9d-c44aa93dfafa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec187db0-f4f6-4d89-ac9d-c44aa93dfafa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["ILMJ8Q7qRMWWwZLzasBErg"], "expires_at": "2020-12-05T14:23:54.000000Z", "issued_at": "2020-12-05T13:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.108 41 INFO tempest.lib.common.rest_client [req-b39b24df-7cc0-4370-9ce0-373035146b7f ] Request (KeypairsRbacTest:test_create_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.060s 2020-12-05 13:23:54.108 41 DEBUG tempest.lib.common.rest_client [req-b39b24df-7cc0-4370-9ce0-373035146b7f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b39b24df-7cc0-4370-9ce0-373035146b7f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.142 40 INFO tempest.lib.common.rest_client [req-c866c43f-0749-490a-b7ad-bce66e795dff ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.056s 2020-12-05 13:23:54.142 40 DEBUG tempest.lib.common.rest_client [req-c866c43f-0749-490a-b7ad-bce66e795dff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c866c43f-0749-490a-b7ad-bce66e795dff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.195 40 INFO tempest.lib.common.rest_client [req-9acb8617-c83e-4373-a531-1a54b8d13513 ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-05 13:23:54.195 40 DEBUG tempest.lib.common.rest_client [req-9acb8617-c83e-4373-a531-1a54b8d13513 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9acb8617-c83e-4373-a531-1a54b8d13513', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.196 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:54.196 41 INFO tempest.lib.common.rest_client [req-b0a5ee76-d7ce-4de6-9143-e45609d32133 ] Request (KeypairsRbacTest:test_create_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:54.196 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:54.197 41 DEBUG tempest.lib.common.rest_client [req-b0a5ee76-d7ce-4de6-9143-e45609d32133 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b0a5ee76-d7ce-4de6-9143-e45609d32133', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["pFSfp_jIRJ69MOrq1Y0DuA"], "expires_at": "2020-12-05T14:23:54.000000Z", "issued_at": "2020-12-05T13:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.257 40 INFO tempest.lib.common.rest_client [req-726439d8-d971-4091-aaec-f7124389a33d ] Request (FlavorRxtxRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles 0.059s 2020-12-05 13:23:54.257 40 DEBUG tempest.lib.common.rest_client [req-726439d8-d971-4091-aaec-f7124389a33d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-726439d8-d971-4091-aaec-f7124389a33d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.293 39 INFO tempest.lib.common.rest_client [req-f1d0176b-beea-4ed8-8b9d-1d2b12077917 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/1/uptime 0.231s 2020-12-05 13:23:54.294 39 DEBUG tempest.lib.common.rest_client [req-f1d0176b-beea-4ed8-8b9d-1d2b12077917 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '184', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f1d0176b-beea-4ed8-8b9d-1d2b12077917', 'x-compute-request-id': 'req-f1d0176b-beea-4ed8-8b9d-1d2b12077917', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/1/uptime'} Body: b'{"hypervisor": {"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "uptime": " 05:23:54 up 59 days, 16:58, 1 user, load average: 9.02, 9.26, 9.48\\n"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.299 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:54.318 41 INFO tempest.lib.common.rest_client [req-450c83be-9e12-4ba3-9466-a7c9589d8327 ] Request (KeypairsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-209850077 0.119s 2020-12-05 13:23:54.319 41 DEBUG tempest.lib.common.rest_client [req-450c83be-9e12-4ba3-9466-a7c9589d8327 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-450c83be-9e12-4ba3-9466-a7c9589d8327', 'x-compute-request-id': 'req-450c83be-9e12-4ba3-9466-a7c9589d8327', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-209850077'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.325 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:54.326 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.327 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.327 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.327 40 INFO tempest.lib.common.rest_client [req-a76d1cb4-c365-4b48-a29c-1c49eccc5cea ] Request (FlavorRxtxRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles/72a4576c553448cd941b052c1ca0cf2d 0.069s 2020-12-05 13:23:54.328 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.328 40 DEBUG tempest.lib.common.rest_client [req-a76d1cb4-c365-4b48-a29c-1c49eccc5cea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a76d1cb4-c365-4b48-a29c-1c49eccc5cea', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.328 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.328 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.329 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.329 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.330 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.330 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.330 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.331 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.331 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.331 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.332 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.332 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.332 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.333 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.333 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.333 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.334 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.334 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.334 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.334 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.335 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.335 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.335 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.336 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.336 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.336 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.336 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.337 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.337 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.337 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.338 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.338 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.338 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.338 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.339 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.339 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.339 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.340 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.341 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.341 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.341 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.342 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.343 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.343 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.343 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.344 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.345 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.345 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.346 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.346 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.346 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.347 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.348 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.349 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.350 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:54.351 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:delete, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:54.355 39 INFO tempest.lib.common.rest_client [req-a8d556a3-80b7-4d20-8f77-b0e9e3a0aa08 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 200 GET http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles 0.055s 2020-12-05 13:23:54.355 39 DEBUG tempest.lib.common.rest_client [req-a8d556a3-80b7-4d20-8f77-b0e9e3a0aa08 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8d556a3-80b7-4d20-8f77-b0e9e3a0aa08', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24/users/eb321cef7db04bf1962c95861cf2adee/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.433 39 INFO tempest.lib.common.rest_client [req-7dc23556-e45c-4f2d-b620-d85775673f45 ] Request (HypervisorRbacTest:test_show_hypervisor_uptime): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:23:54.434 39 DEBUG tempest.lib.common.rest_client [req-7dc23556-e45c-4f2d-b620-d85775673f45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6626', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7dc23556-e45c-4f2d-b620-d85775673f45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "eb321cef7db04bf1962c95861cf2adee", "name": "tempest-HypervisorRbacTest-666614047", "password_expires_at": null}, "audit_ids": ["aPKqPygjTl-qO14OcRERrg"], "expires_at": "2020-12-05T14:23:54.000000Z", "issued_at": "2020-12-05T13:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9a3c534f6998402cb965dc3e3a351e24", "name": "tempest-HypervisorRbacTest-666614047"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_9a3c534f6998402cb965dc3e3a351e24", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.442 40 INFO tempest.lib.common.rest_client [req-b3113304-35e5-4db1-87e6-44caa28e926a ] Request (FlavorRxtxRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles/a629c95d64b3416fb80ae90af4f69c05 0.113s 2020-12-05 13:23:54.443 40 DEBUG tempest.lib.common.rest_client [req-b3113304-35e5-4db1-87e6-44caa28e926a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b3113304-35e5-4db1-87e6-44caa28e926a', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036/users/50b2a27a35b24d9d92c7f1a9d401ae6e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.570 41 INFO tempest.lib.common.rest_client [req-503f5e13-ee1f-431c-a579-6ead00e069f4 ] Request (KeypairsRbacTest:test_delete_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.218s 2020-12-05 13:23:54.570 41 DEBUG tempest.lib.common.rest_client [req-503f5e13-ee1f-431c-a579-6ead00e069f4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-1368880657"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2314', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-503f5e13-ee1f-431c-a579-6ead00e069f4', 'x-compute-request-id': 'req-503f5e13-ee1f-431c-a579-6ead00e069f4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\nWbMAAGzOBVQqMuxyQwLZnvmMSqIJcJm+bafXo8Jra++gHMO1BNw=\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-1368880657", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLBJQg83PFHC8UUNjxOX7Bm3I4wMkmso1j9SGDeCDdcTcTaeyoR1dk0eroO47FBWK++4jD2l/ZLf8n4CvBzbUmN2YHwu+XJ9QS9N+9HLPGRb8GaioF1nTfcertNLiyEZSbH+OGtE56jCD/xBBMCkfVWacTX/nA1HSzxHeLzmiLD+hzWh4MeooiZN6GxeOk22H8Dey9mXM4lI5Nfu9kYSa/Y9S2EKn6VTufD1dMtH7i4hjKK1v5islmO7IoWxVwon53jjRpyFxIOHVkQeHhMY8qfboIgGB/x/9Vi9xbsFtaAvxM72ec4Q/mj3gJ3W4VKGe+pEQPvq9skMnm/l3TCchJ Generated-by-Nova", "fingerprint": "de:1c:e8:32:fb:e9:fb:66:4c:ea:bd:29:cc:81:22:f7", "user_id": "fc1ac36dc4c74d21abba4bc0d6883d41"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.572 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:54.618 39 INFO tempest.lib.common.rest_client [req-32f1a7c5-ef64-4d32-9793-04e4a3392f7c ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/eb321cef7db04bf1962c95861cf2adee 0.179s 2020-12-05 13:23:54.618 39 DEBUG tempest.lib.common.rest_client [req-32f1a7c5-ef64-4d32-9793-04e4a3392f7c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32f1a7c5-ef64-4d32-9793-04e4a3392f7c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/eb321cef7db04bf1962c95861cf2adee'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.626 41 INFO tempest.lib.common.rest_client [req-e7971767-c6e3-47b3-8c0b-315b8a76b96a ] Request (KeypairsRbacTest:test_delete_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.053s 2020-12-05 13:23:54.627 41 DEBUG tempest.lib.common.rest_client [req-e7971767-c6e3-47b3-8c0b-315b8a76b96a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e7971767-c6e3-47b3-8c0b-315b8a76b96a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.707 41 INFO tempest.lib.common.rest_client [req-d86d34d5-3cc5-46d5-aa7d-12103d25bcdc ] Request (KeypairsRbacTest:test_delete_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:54.708 41 DEBUG tempest.lib.common.rest_client [req-d86d34d5-3cc5-46d5-aa7d-12103d25bcdc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d86d34d5-3cc5-46d5-aa7d-12103d25bcdc', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["oxdboG93SNqip80NR6vPgQ"], "expires_at": "2020-12-05T14:23:54.000000Z", "issued_at": "2020-12-05T13:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.717 39 INFO tempest.lib.common.rest_client [req-129da09d-e7a5-42ca-8acf-fe15f9e31914 ] Request (HypervisorRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.098s 2020-12-05 13:23:54.718 39 DEBUG tempest.lib.common.rest_client [req-129da09d-e7a5-42ca-8acf-fe15f9e31914 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-129da09d-e7a5-42ca-8acf-fe15f9e31914', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["eKHtsLz-QwOC9S3IwzidRA"], "expires_at": "2020-12-05T14:23:54.000000Z", "issued_at": "2020-12-05T13:23:54.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.923 41 INFO tempest.lib.common.rest_client [req-d8230fbd-5bc7-4c75-a724-50132949076e ] Request (KeypairsRbacTest:test_delete_keypair): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1368880657 0.214s 2020-12-05 13:23:54.923 41 DEBUG tempest.lib.common.rest_client [req-d8230fbd-5bc7-4c75-a724-50132949076e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-d8230fbd-5bc7-4c75-a724-50132949076e', 'x-compute-request-id': 'req-d8230fbd-5bc7-4c75-a724-50132949076e', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1368880657'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:54.923 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:54.981 41 INFO tempest.lib.common.rest_client [req-17ea56fd-788d-4474-9223-9bbacabbb6ce ] Request (KeypairsRbacTest:test_delete_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.057s 2020-12-05 13:23:54.982 41 DEBUG tempest.lib.common.rest_client [req-17ea56fd-788d-4474-9223-9bbacabbb6ce ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-17ea56fd-788d-4474-9223-9bbacabbb6ce', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.016 41 INFO tempest.lib.common.rest_client [req-0508b852-fb86-43fb-8115-a673532ade44 ] Request (KeypairsRbacTest:test_delete_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:55.016 41 DEBUG tempest.lib.common.rest_client [req-0508b852-fb86-43fb-8115-a673532ade44 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:54 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0508b852-fb86-43fb-8115-a673532ade44', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["e-LiljZtSIGxfBtHUjKdfQ"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.044 39 INFO tempest.lib.common.rest_client [req-40d987d5-3b66-4c78-83f6-51a340d0c8ba ] Request (HypervisorRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a3c534f6998402cb965dc3e3a351e24&name=default 0.325s 2020-12-05 13:23:55.045 39 DEBUG tempest.lib.common.rest_client [req-40d987d5-3b66-4c78-83f6-51a340d0c8ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-40d987d5-3b66-4c78-83f6-51a340d0c8ba', 'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=9a3c534f6998402cb965dc3e3a351e24&name=default'} Body: b'{"security_groups": [{"id": "80b1ae10-a74d-4289-9ad9-472992238763", "name": "default", "stateful": true, "tenant_id": "9a3c534f6998402cb965dc3e3a351e24", "description": "Default security group", "security_group_rules": [{"id": "100a5594-c254-41ad-b260-670a51c692d4", "tenant_id": "9a3c534f6998402cb965dc3e3a351e24", "security_group_id": "80b1ae10-a74d-4289-9ad9-472992238763", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:54Z", "updated_at": "2020-12-05T13:23:54Z", "revision_number": 0, "project_id": "9a3c534f6998402cb965dc3e3a351e24"}, {"id": "5a2a9034-33eb-4b1a-a5b4-c839e1f682ad", "tenant_id": "9a3c534f6998402cb965dc3e3a351e24", "security_group_id": "80b1ae10-a74d-4289-9ad9-472992238763", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "80b1ae10-a74d-4289-9ad9-472992238763", "description": null, "tags": [], "created_at": "2020-12-05T13:23:54Z", "updated_at": "2020-12-05T13:23:54Z", "revision_number": 0, "project_id": "9a3c534f6998402cb965dc3e3a351e24"}, {"id": "e6042f63-5a92-401e-9fe1-b1e36c69a186", "tenant_id": "9a3c534f6998402cb965dc3e3a351e24", "security_group_id": "80b1ae10-a74d-4289-9ad9-472992238763", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:54Z", "updated_at": "2020-12-05T13:23:54Z", "revision_number": 0, "project_id": "9a3c534f6998402cb965dc3e3a351e24"}, {"id": "fff45979-753a-4171-b352-6bfb4d3bc021", "tenant_id": "9a3c534f6998402cb965dc3e3a351e24", "security_group_id": "80b1ae10-a74d-4289-9ad9-472992238763", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "80b1ae10-a74d-4289-9ad9-472992238763", "description": null, "tags": [], "created_at": "2020-12-05T13:23:54Z", "updated_at": "2020-12-05T13:23:54Z", "revision_number": 0, "project_id": "9a3c534f6998402cb965dc3e3a351e24"}], "tags": [], "created_at": "2020-12-05T13:23:54Z", "updated_at": "2020-12-05T13:23:54Z", "revision_number": 1, "project_id": "9a3c534f6998402cb965dc3e3a351e24"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.093 38 INFO tempest.lib.common.rest_client [req-a9126794-9920-4f36-9e35-3fa3ba894925 ] Request (ImagesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3043ec12e06e4cc88a69094be73f9dea&name=default 3.200s 2020-12-05 13:23:55.094 38 DEBUG tempest.lib.common.rest_client [req-a9126794-9920-4f36-9e35-3fa3ba894925 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-a9126794-9920-4f36-9e35-3fa3ba894925', 'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=3043ec12e06e4cc88a69094be73f9dea&name=default'} Body: b'{"security_groups": [{"id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "name": "default", "stateful": true, "tenant_id": "3043ec12e06e4cc88a69094be73f9dea", "description": "Default security group", "security_group_rules": [{"id": "3903af11-e110-481b-b8c5-925470e891c5", "tenant_id": "3043ec12e06e4cc88a69094be73f9dea", "security_group_id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "3043ec12e06e4cc88a69094be73f9dea"}, {"id": "3ee5072d-6871-4b56-b532-55ba0d1c427d", "tenant_id": "3043ec12e06e4cc88a69094be73f9dea", "security_group_id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "3043ec12e06e4cc88a69094be73f9dea"}, {"id": "a4270b8d-5f78-4921-8f34-250212e3ede8", "tenant_id": "3043ec12e06e4cc88a69094be73f9dea", "security_group_id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "3043ec12e06e4cc88a69094be73f9dea"}, {"id": "ac17a5ff-fcb7-423e-a1b1-5812daf7069a", "tenant_id": "3043ec12e06e4cc88a69094be73f9dea", "security_group_id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "093da90e-272a-4855-8cdd-b6c44ce5222b", "description": null, "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 0, "project_id": "3043ec12e06e4cc88a69094be73f9dea"}], "tags": [], "created_at": "2020-12-05T13:23:52Z", "updated_at": "2020-12-05T13:23:52Z", "revision_number": 1, "project_id": "3043ec12e06e4cc88a69094be73f9dea"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.124 41 INFO tempest.lib.common.rest_client [req-6088c2c6-6ed9-4bdb-b283-c9f9f2cdb05a ] Request (KeypairsRbacTest:_run_cleanups): 404 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1368880657 0.106s 2020-12-05 13:23:55.125 41 DEBUG tempest.lib.common.rest_client [req-6088c2c6-6ed9-4bdb-b283-c9f9f2cdb05a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'content-type': 'application/json; charset=UTF-8', 'content-length': '145', 'x-openstack-request-id': 'req-6088c2c6-6ed9-4bdb-b283-c9f9f2cdb05a', 'x-compute-request-id': 'req-6088c2c6-6ed9-4bdb-b283-c9f9f2cdb05a', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1368880657'} Body: b'{"itemNotFound": {"code": 404, "message": "Keypair tempest-KeypairsRbacTest-key-1368880657 not found for user fc1ac36dc4c74d21abba4bc0d6883d41"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.130 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:55.131 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.132 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.132 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.133 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.133 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.134 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.134 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.134 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.135 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.135 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.135 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.136 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.136 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.136 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.136 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.137 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.137 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.137 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.138 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.138 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.138 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.139 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.139 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.139 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.140 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.140 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.140 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.140 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.141 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.141 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.141 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.142 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.142 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.142 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.142 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.143 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.143 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.143 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.144 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.144 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.144 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.144 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.145 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.145 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.145 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.146 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.146 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.146 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.147 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.147 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.147 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.148 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.148 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.148 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.148 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.149 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.149 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.149 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.150 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.150 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.151 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.151 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.151 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.151 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.152 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.152 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.152 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.153 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.153 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.153 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.154 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.154 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.154 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.154 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.155 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.156 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:55.156 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:55.176 39 INFO tempest.lib.common.rest_client [req-3a5b565b-f9e1-4eb0-83e2-138bd3493c1e ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/80b1ae10-a74d-4289-9ad9-472992238763 0.130s 2020-12-05 13:23:55.176 39 DEBUG tempest.lib.common.rest_client [req-3a5b565b-f9e1-4eb0-83e2-138bd3493c1e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-3a5b565b-f9e1-4eb0-83e2-138bd3493c1e', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/80b1ae10-a74d-4289-9ad9-472992238763'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.206 41 INFO tempest.lib.common.rest_client [req-57c4ef95-8a69-4fe0-967d-fc85e2a5e98b ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.049s 2020-12-05 13:23:55.206 41 DEBUG tempest.lib.common.rest_client [req-57c4ef95-8a69-4fe0-967d-fc85e2a5e98b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-57c4ef95-8a69-4fe0-967d-fc85e2a5e98b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.246 41 INFO tempest.lib.common.rest_client [req-a9f7b787-e5cb-4bd8-8c93-84a449d4d40b ] Request (KeypairsRbacTest:test_index_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-05 13:23:55.247 41 DEBUG tempest.lib.common.rest_client [req-a9f7b787-e5cb-4bd8-8c93-84a449d4d40b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9f7b787-e5cb-4bd8-8c93-84a449d4d40b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["e6PSx0kmT564AyNLL52tpg"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.250 38 INFO tempest.lib.common.rest_client [req-c49ee628-cfbd-48e3-8843-313781ee8cd9 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/093da90e-272a-4855-8cdd-b6c44ce5222b 0.155s 2020-12-05 13:23:55.251 38 DEBUG tempest.lib.common.rest_client [req-c49ee628-cfbd-48e3-8843-313781ee8cd9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-c49ee628-cfbd-48e3-8843-313781ee8cd9', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/093da90e-272a-4855-8cdd-b6c44ce5222b'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.304 39 INFO tempest.lib.common.rest_client [req-1d427d84-5325-46d2-843d-8837e110f3b4 ] Request (HypervisorRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24 0.126s 2020-12-05 13:23:55.305 39 DEBUG tempest.lib.common.rest_client [req-1d427d84-5325-46d2-843d-8837e110f3b4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1d427d84-5325-46d2-843d-8837e110f3b4', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/9a3c534f6998402cb965dc3e3a351e24'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.349 39 INFO tempest.lib.common.rest_client [req-4816c67f-2375-489c-95dc-706aeb71540a ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.041s 2020-12-05 13:23:55.350 39 DEBUG tempest.lib.common.rest_client [req-4816c67f-2375-489c-95dc-706aeb71540a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4816c67f-2375-489c-95dc-706aeb71540a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["Uy--nJiXRaS_DSuc9f4NBA"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.394 39 INFO tempest.lib.common.rest_client [req-7edeffba-d061-47eb-9743-764476fcd0a6 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:23:55.394 39 DEBUG tempest.lib.common.rest_client [req-7edeffba-d061-47eb-9743-764476fcd0a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7edeffba-d061-47eb-9743-764476fcd0a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["ZGg933t7TWuE51Qwn6L0sQ"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.452 38 INFO tempest.lib.common.rest_client [req-a91f2dd1-0b13-4b65-8521-3aa62d5f8cb3 ] Request (ImagesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea 0.200s 2020-12-05 13:23:55.452 38 DEBUG tempest.lib.common.rest_client [req-a91f2dd1-0b13-4b65-8521-3aa62d5f8cb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a91f2dd1-0b13-4b65-8521-3aa62d5f8cb3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/3043ec12e06e4cc88a69094be73f9dea'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.474 41 INFO tempest.lib.common.rest_client [req-e9336fe2-fa2a-40ad-911c-b35655eba218 ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/compute/v2.1/os-keypairs 0.225s 2020-12-05 13:23:55.475 41 DEBUG tempest.lib.common.rest_client [req-e9336fe2-fa2a-40ad-911c-b35655eba218 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '16', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e9336fe2-fa2a-40ad-911c-b35655eba218', 'x-compute-request-id': 'req-e9336fe2-fa2a-40ad-911c-b35655eba218', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypairs": []}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.478 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:55.495 38 INFO tempest.lib.common.rest_client [req-a7057b26-0f76-49f2-8e66-e46909e7cd43 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:55.496 38 DEBUG tempest.lib.common.rest_client [req-a7057b26-0f76-49f2-8e66-e46909e7cd43 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7057b26-0f76-49f2-8e66-e46909e7cd43', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["zt7FAyJtT92XtcsV5f0NSw"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.500 39 INFO tempest.lib.common.rest_client [req-a4558cfb-ba6a-4169-bbd0-f2608dab5e6e ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.104s 2020-12-05 13:23:55.500 39 DEBUG tempest.lib.common.rest_client [req-a4558cfb-ba6a-4169-bbd0-f2608dab5e6e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a4558cfb-ba6a-4169-bbd0-f2608dab5e6e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.533 40 INFO tempest.lib.common.rest_client [req-687c2041-fb5a-4f45-952b-20016997e7c8 ] Request (FlavorRxtxRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-05 13:23:55.534 40 DEBUG tempest.lib.common.rest_client [req-687c2041-fb5a-4f45-952b-20016997e7c8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-687c2041-fb5a-4f45-952b-20016997e7c8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "50b2a27a35b24d9d92c7f1a9d401ae6e", "name": "tempest-FlavorRxtxRbacTest-1101470792", "password_expires_at": null}, "audit_ids": ["1QMzeO_UTJm-vvNCH1KD4g"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd735af706a344bfa0370581d7cb2036", "name": "tempest-FlavorRxtxRbacTest-1101470792"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_bd735af706a344bfa0370581d7cb2036", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.541 38 INFO tempest.lib.common.rest_client [req-7fed7689-56e5-4198-a455-1b1dc08d3b97 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-05 13:23:55.541 38 DEBUG tempest.lib.common.rest_client [req-7fed7689-56e5-4198-a455-1b1dc08d3b97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fed7689-56e5-4198-a455-1b1dc08d3b97', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["5IZtb0hpT0OFvbQ1anj9lw"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.541 41 INFO tempest.lib.common.rest_client [req-4ab659c1-460f-426a-b82b-7911a1a567da ] Request (KeypairsRbacTest:test_index_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.062s 2020-12-05 13:23:55.542 41 DEBUG tempest.lib.common.rest_client [req-4ab659c1-460f-426a-b82b-7911a1a567da ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4ab659c1-460f-426a-b82b-7911a1a567da', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.561 39 INFO tempest.lib.common.rest_client [req-3514099f-03d6-4275-8648-97ea9329211e ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.059s 2020-12-05 13:23:55.561 39 DEBUG tempest.lib.common.rest_client [req-3514099f-03d6-4275-8648-97ea9329211e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-LimitsRbacTest-1578118051-desc", "domain_id": "default", "name": "tempest-LimitsRbacTest-1578118051"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '366', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3514099f-03d6-4275-8648-97ea9329211e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "2d308455ea2c45c29dd83d74af787692", "name": "tempest-LimitsRbacTest-1578118051", "domain_id": "default", "description": "tempest-LimitsRbacTest-1578118051-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.584 38 INFO tempest.lib.common.rest_client [req-980f9a16-b062-4be1-a742-40015ebd3257 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.042s 2020-12-05 13:23:55.585 38 DEBUG tempest.lib.common.rest_client [req-980f9a16-b062-4be1-a742-40015ebd3257 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-980f9a16-b062-4be1-a742-40015ebd3257', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.618 41 INFO tempest.lib.common.rest_client [req-d0944ec9-437d-4ecd-8c58-62527abcf3ea ] Request (KeypairsRbacTest:test_index_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-05 13:23:55.619 41 DEBUG tempest.lib.common.rest_client [req-d0944ec9-437d-4ecd-8c58-62527abcf3ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d0944ec9-437d-4ecd-8c58-62527abcf3ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["7tBrJRztRFSd7xZQE6ax1Q"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.623 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:55.623 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.624 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.624 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.624 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.625 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.625 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.626 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.626 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.626 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.626 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.627 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.627 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.627 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.628 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.628 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.628 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.628 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.629 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.629 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.629 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.630 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.630 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.630 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.630 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.631 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.631 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.631 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.632 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.632 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.632 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.632 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.633 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.633 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.633 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.633 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.634 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.634 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.634 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.635 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.635 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.635 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.635 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.636 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.636 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.636 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.637 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.637 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.637 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.637 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.638 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.638 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.638 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.639 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.639 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.639 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.640 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.640 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.640 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.640 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.641 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.641 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.642 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.642 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.642 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.642 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.643 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.643 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.643 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.644 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.644 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.644 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.644 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.645 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.645 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.645 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:55.646 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-keypairs:show, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:55.673 40 INFO tempest.lib.common.rest_client [req-10916bd2-88ee-4e38-b399-7a94a7fba688 ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/50b2a27a35b24d9d92c7f1a9d401ae6e 0.134s 2020-12-05 13:23:55.673 40 DEBUG tempest.lib.common.rest_client [req-10916bd2-88ee-4e38-b399-7a94a7fba688 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-10916bd2-88ee-4e38-b399-7a94a7fba688', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/50b2a27a35b24d9d92c7f1a9d401ae6e'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.678 39 INFO tempest.lib.common.rest_client [req-2a498ba8-8f3f-4814-a8ae-59d6ef4b70b2 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.115s 2020-12-05 13:23:55.679 39 DEBUG tempest.lib.common.rest_client [req-2a498ba8-8f3f-4814-a8ae-59d6ef4b70b2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-LimitsRbacTest-1578118051", "password": "G2@hk4hA06~Gh*n", "project_id": "2d308455ea2c45c29dd83d74af787692", "email": "tempest-LimitsRbacTest-37360626@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a498ba8-8f3f-4814-a8ae-59d6ef4b70b2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "2d308455ea2c45c29dd83d74af787692", "email": "tempest-LimitsRbacTest-37360626@example.com", "id": "d38f84c57b8b46caa74a46154c0f3cad", "name": "tempest-LimitsRbacTest-1578118051", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d38f84c57b8b46caa74a46154c0f3cad"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.697 38 INFO tempest.lib.common.rest_client [req-2a94efcd-eb4d-4ba1-aad1-33d00421a4a4 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.111s 2020-12-05 13:23:55.697 38 DEBUG tempest.lib.common.rest_client [req-2a94efcd-eb4d-4ba1-aad1-33d00421a4a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-InstanceUsagesAuditLogRbacTest-1273865341-desc", "domain_id": "default", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '398', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2a94efcd-eb4d-4ba1-aad1-33d00421a4a4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "domain_id": "default", "description": "tempest-InstanceUsagesAuditLogRbacTest-1273865341-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.746 40 INFO tempest.lib.common.rest_client [req-b2b44a84-e5ff-42bf-85f0-85e88c71f449 ] Request (FlavorRxtxRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.072s 2020-12-05 13:23:55.747 40 DEBUG tempest.lib.common.rest_client [req-b2b44a84-e5ff-42bf-85f0-85e88c71f449 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b2b44a84-e5ff-42bf-85f0-85e88c71f449', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["YPcu5__tQRSSFyZAcue6SA"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.764 39 INFO tempest.lib.common.rest_client [req-2c17874b-0efc-4d9f-b9a6-5768366845d5 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.084s 2020-12-05 13:23:55.764 39 DEBUG tempest.lib.common.rest_client [req-2c17874b-0efc-4d9f-b9a6-5768366845d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2c17874b-0efc-4d9f-b9a6-5768366845d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.827 39 INFO tempest.lib.common.rest_client [req-2197f907-046a-47da-b62e-62370d9e583b ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.062s 2020-12-05 13:23:55.828 39 DEBUG tempest.lib.common.rest_client [req-2197f907-046a-47da-b62e-62370d9e583b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2197f907-046a-47da-b62e-62370d9e583b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.843 38 INFO tempest.lib.common.rest_client [req-a33cec3d-d665-45ab-93e4-63203251327d ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.144s 2020-12-05 13:23:55.844 38 DEBUG tempest.lib.common.rest_client [req-a33cec3d-d665-45ab-93e4-63203251327d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password": "N6#iZCNehp6WW7g", "project_id": "fee49dda14d14ca08862c47f405e04ad", "email": "tempest-InstanceUsagesAuditLogRbacTest-352222371@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '415', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a33cec3d-d665-45ab-93e4-63203251327d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fee49dda14d14ca08862c47f405e04ad", "email": "tempest-InstanceUsagesAuditLogRbacTest-352222371@example.com", "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/725781f9452a4b18bfc45d795d6cc7b6"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.897 39 INFO tempest.lib.common.rest_client [req-b843448c-aa14-4769-ac25-951387758742 ] Request (LimitsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-05 13:23:55.898 39 DEBUG tempest.lib.common.rest_client [req-b843448c-aa14-4769-ac25-951387758742 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b843448c-aa14-4769-ac25-951387758742', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:55.898 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsRbacTest-1578118051', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2d308455ea2c45c29dd83d74af787692', 'project_name': 'tempest-LimitsRbacTest-1578118051', 'tenant_id': '2d308455ea2c45c29dd83d74af787692', 'tenant_name': 'tempest-LimitsRbacTest-1578118051', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd38f84c57b8b46caa74a46154c0f3cad'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:55.899 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-LimitsRbacTest-1578118051', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '2d308455ea2c45c29dd83d74af787692', 'project_name': 'tempest-LimitsRbacTest-1578118051', 'tenant_id': '2d308455ea2c45c29dd83d74af787692', 'tenant_name': 'tempest-LimitsRbacTest-1578118051', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd38f84c57b8b46caa74a46154c0f3cad'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:55.899 38 INFO tempest.lib.common.rest_client [req-a489b290-812a-4fa4-86f4-f9caaea41619 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.054s 2020-12-05 13:23:55.900 38 DEBUG tempest.lib.common.rest_client [req-a489b290-812a-4fa4-86f4-f9caaea41619 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a489b290-812a-4fa4-86f4-f9caaea41619', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.006 38 INFO tempest.lib.common.rest_client [req-744a52f7-60e5-44cd-868e-1ba142f7a1ff ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.105s 2020-12-05 13:23:56.006 38 DEBUG tempest.lib.common.rest_client [req-744a52f7-60e5-44cd-868e-1ba142f7a1ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-744a52f7-60e5-44cd-868e-1ba142f7a1ff', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.018 39 INFO tempest.lib.common.rest_client [req-76b23f48-4d0e-4413-aa76-442d3c039311 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.109s 2020-12-05 13:23:56.018 39 DEBUG tempest.lib.common.rest_client [req-76b23f48-4d0e-4413-aa76-442d3c039311 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6559', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76b23f48-4d0e-4413-aa76-442d3c039311', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d38f84c57b8b46caa74a46154c0f3cad", "name": "tempest-LimitsRbacTest-1578118051", "password_expires_at": null}, "audit_ids": ["pLrmw4X3RXWfPdpByQfveQ"], "expires_at": "2020-12-05T14:23:55.000000Z", "issued_at": "2020-12-05T13:23:55.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d308455ea2c45c29dd83d74af787692", "name": "tempest-LimitsRbacTest-1578118051"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/im _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.036 40 INFO tempest.lib.common.rest_client [req-97ba5601-aecf-421d-a59e-0a85332cff12 ] Request (FlavorRxtxRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=bd735af706a344bfa0370581d7cb2036&name=default 0.288s 2020-12-05 13:23:56.037 41 INFO tempest.lib.common.rest_client [req-9d01d42a-bc87-4aab-b136-b9204268c57a ] Request (KeypairsRbacTest:test_show_keypair): 200 POST http://172.30.13.94/compute/v2.1/os-keypairs 0.390s 2020-12-05 13:23:56.037 40 DEBUG tempest.lib.common.rest_client [req-97ba5601-aecf-421d-a59e-0a85332cff12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-97ba5601-aecf-421d-a59e-0a85332cff12', 'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=bd735af706a344bfa0370581d7cb2036&name=default'} Body: b'{"security_groups": [{"id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "name": "default", "stateful": true, "tenant_id": "bd735af706a344bfa0370581d7cb2036", "description": "Default security group", "security_group_rules": [{"id": "156dfe3d-22f8-4bf4-8e8b-631129021697", "tenant_id": "bd735af706a344bfa0370581d7cb2036", "security_group_id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "description": null, "tags": [], "created_at": "2020-12-05T13:23:55Z", "updated_at": "2020-12-05T13:23:55Z", "revision_number": 0, "project_id": "bd735af706a344bfa0370581d7cb2036"}, {"id": "5c6ecdcb-e98e-40cb-8112-d70b18a687bd", "tenant_id": "bd735af706a344bfa0370581d7cb2036", "security_group_id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "description": null, "tags": [], "created_at": "2020-12-05T13:23:55Z", "updated_at": "2020-12-05T13:23:55Z", "revision_number": 0, "project_id": "bd735af706a344bfa0370581d7cb2036"}, {"id": "a8a51089-5b4a-4ad6-8255-362ba8f5a8c1", "tenant_id": "bd735af706a344bfa0370581d7cb2036", "security_group_id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:55Z", "updated_at": "2020-12-05T13:23:55Z", "revision_number": 0, "project_id": "bd735af706a344bfa0370581d7cb2036"}, {"id": "b1f61acc-4217-400b-8b04-4c0dd313c02a", "tenant_id": "bd735af706a344bfa0370581d7cb2036", "security_group_id": "7b0a324a-795f-4b85-a7f5-70adce6220b9", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:55Z", "updated_at": "2020-12-05T13:23:55Z", "revision_number": 0, "project_id": "bd735af706a344bfa0370581d7cb2036"}], "tags": [], "created_at": "2020-12-05T13:23:55Z", "updated_at": "2020-12-05T13:23:55Z", "revision_number": 1, "project_id": "bd735af706a344bfa0370581d7cb2036"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.037 41 DEBUG tempest.lib.common.rest_client [req-9d01d42a-bc87-4aab-b136-b9204268c57a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"keypair": {"name": "tempest-KeypairsRbacTest-key-1974838245"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:55 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '2314', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-9d01d42a-bc87-4aab-b136-b9204268c57a', 'x-compute-request-id': 'req-9d01d42a-bc87-4aab-b136-b9204268c57a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs'} Body: b'{"keypair": {"private_key": "-----BEGIN RSA PRIVATE KEY-----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\\nCpriM5VofQdolirvi1PTA+lbdK7F0+fBa5FmWyzU2pB+pHk9XeEW\\n-----END RSA PRIVATE KEY-----\\n", "name": "tempest-KeypairsRbacTest-key-1974838245", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdM6+VTipMPSeFhIfFquSyGxN4Dra/w1A0+XNnZduZhehF3YdL0YSWlC57ogU9HuYKPOs2jkq5orttUHu4ISHHan6WPPMu3XAkPPTNOap/CTTHw1eRFug1WA4efGNUKu2FohMO+Vkp/Hp5zcZu/Ro11iOGmbf+McXqaIfDUWxz8q7qWNLTl+68tB+XYAmm1Nr7G7egWkuLAFtbWpxPFrxARJrUYtlmhF7ErcA5ZyNmrUvU/C/sO/6J4LB8dnAeAgBQYuUbt/EJVucymVekyZPk233I5BFJp0Cau8JFtt12pLp0GK0kv0GVJC3XHlcNvYtsa7uBcZkRIcn3IY9tP4W5 Generated-by-Nova", "fingerprint": "c7:4c:b9:16:7d:3b:2d:09:f7:d9:96:2c:db:ff:04:52", "user_id": "fc1ac36dc4c74d21abba4bc0d6883d41"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.041 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:56.053 39 INFO tempest.lib.common.rest_client [req-41271ecc-7d24-485a-ab11-fb95b5558096 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:56.053 39 DEBUG tempest.lib.common.rest_client [req-41271ecc-7d24-485a-ab11-fb95b5558096 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-41271ecc-7d24-485a-ab11-fb95b5558096', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["Wf3OFUv9RpiOfA4Oubf1Sw"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.075 38 INFO tempest.lib.common.rest_client [req-5e28f82d-0f78-45f5-b907-0bf3dcf6b82c ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-05 13:23:56.075 38 DEBUG tempest.lib.common.rest_client [req-5e28f82d-0f78-45f5-b907-0bf3dcf6b82c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e28f82d-0f78-45f5-b907-0bf3dcf6b82c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.076 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-InstanceUsagesAuditLogRbacTest-1273865341', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fee49dda14d14ca08862c47f405e04ad', 'project_name': 'tempest-InstanceUsagesAuditLogRbacTest-1273865341', 'tenant_id': 'fee49dda14d14ca08862c47f405e04ad', 'tenant_name': 'tempest-InstanceUsagesAuditLogRbacTest-1273865341', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '725781f9452a4b18bfc45d795d6cc7b6'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:56.076 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-InstanceUsagesAuditLogRbacTest-1273865341', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fee49dda14d14ca08862c47f405e04ad', 'project_name': 'tempest-InstanceUsagesAuditLogRbacTest-1273865341', 'tenant_id': 'fee49dda14d14ca08862c47f405e04ad', 'tenant_name': 'tempest-InstanceUsagesAuditLogRbacTest-1273865341', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '725781f9452a4b18bfc45d795d6cc7b6'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:56.091 41 INFO tempest.lib.common.rest_client [req-5e20297b-44d6-464d-ad3e-42bd658c2604 ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.049s 2020-12-05 13:23:56.092 41 DEBUG tempest.lib.common.rest_client [req-5e20297b-44d6-464d-ad3e-42bd658c2604 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e20297b-44d6-464d-ad3e-42bd658c2604', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.144 39 INFO tempest.lib.common.rest_client [req-5c7ce3e0-b6f7-43cb-b468-cfb445aae42f ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:56.145 39 DEBUG tempest.lib.common.rest_client [req-5c7ce3e0-b6f7-43cb-b468-cfb445aae42f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5c7ce3e0-b6f7-43cb-b468-cfb445aae42f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["8EpUtK7uSFSD0isSiDWBAw"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.177 40 INFO tempest.lib.common.rest_client [req-400af414-bad9-43f1-9c6e-ce4247a16137 ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/7b0a324a-795f-4b85-a7f5-70adce6220b9 0.138s 2020-12-05 13:23:56.177 40 DEBUG tempest.lib.common.rest_client [req-400af414-bad9-43f1-9c6e-ce4247a16137 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-400af414-bad9-43f1-9c6e-ce4247a16137', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/7b0a324a-795f-4b85-a7f5-70adce6220b9'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.184 41 INFO tempest.lib.common.rest_client [req-af8e464d-1739-4215-88f6-870ee9b3f6d2 ] Request (KeypairsRbacTest:test_show_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-05 13:23:56.185 41 DEBUG tempest.lib.common.rest_client [req-af8e464d-1739-4215-88f6-870ee9b3f6d2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af8e464d-1739-4215-88f6-870ee9b3f6d2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["ebECac-WT5Wy_d1ACiSinQ"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.188 38 INFO tempest.lib.common.rest_client [req-21b0f84a-2664-4708-975e-557694a13aa6 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-05 13:23:56.188 38 DEBUG tempest.lib.common.rest_client [req-21b0f84a-2664-4708-975e-557694a13aa6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6591', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-21b0f84a-2664-4708-975e-557694a13aa6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password_expires_at": null}, "audit_ids": ["5HO6tAOASQiICUQvKW-Zkg"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne" _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.198 39 INFO tempest.lib.common.rest_client [req-302af5d5-9b3e-4d7c-b3e6-ce5311ec41a4 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.052s 2020-12-05 13:23:56.198 39 DEBUG tempest.lib.common.rest_client [req-302af5d5-9b3e-4d7c-b3e6-ce5311ec41a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-302af5d5-9b3e-4d7c-b3e6-ce5311ec41a4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.228 38 INFO tempest.lib.common.rest_client [req-8a4602e8-1d4e-4e8e-90e3-a326cdba087c ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:56.229 38 DEBUG tempest.lib.common.rest_client [req-8a4602e8-1d4e-4e8e-90e3-a326cdba087c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a4602e8-1d4e-4e8e-90e3-a326cdba087c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["5x29i_8zSUm9qGPvisEBKA"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.250 39 INFO tempest.lib.common.rest_client [req-ef5319b1-750a-4268-bb84-86f68e65f0b5 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-05 13:23:56.251 39 DEBUG tempest.lib.common.rest_client [req-ef5319b1-750a-4268-bb84-86f68e65f0b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ef5319b1-750a-4268-bb84-86f68e65f0b5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.251 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:56.252 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:56.315 40 INFO tempest.lib.common.rest_client [req-e9f47613-09a9-4d73-b2ec-afbf76d38ff2 ] Request (FlavorRxtxRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036 0.137s 2020-12-05 13:23:56.316 40 DEBUG tempest.lib.common.rest_client [req-e9f47613-09a9-4d73-b2ec-afbf76d38ff2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e9f47613-09a9-4d73-b2ec-afbf76d38ff2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/bd735af706a344bfa0370581d7cb2036'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.353 40 INFO tempest.lib.common.rest_client [req-769c314a-48c7-49a9-89a6-46bc85e0bd99 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:23:56.354 40 DEBUG tempest.lib.common.rest_client [req-769c314a-48c7-49a9-89a6-46bc85e0bd99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-769c314a-48c7-49a9-89a6-46bc85e0bd99', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["GXqOG0ZLSI2KqJlPOx5zQw"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.370 39 INFO tempest.lib.common.rest_client [req-03df2055-d5c5-4757-86b5-a37a475cdb27 ] Request (LimitsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles 0.118s 2020-12-05 13:23:56.371 39 DEBUG tempest.lib.common.rest_client [req-03df2055-d5c5-4757-86b5-a37a475cdb27 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03df2055-d5c5-4757-86b5-a37a475cdb27', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.398 40 INFO tempest.lib.common.rest_client [req-f720809c-b9c7-4e89-9bc1-f923ad19b004 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.038s 2020-12-05 13:23:56.399 40 DEBUG tempest.lib.common.rest_client [req-f720809c-b9c7-4e89-9bc1-f923ad19b004 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f720809c-b9c7-4e89-9bc1-f923ad19b004', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["MYa9OdzrQCW6qbv12pgRaw"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.422 38 INFO tempest.lib.common.rest_client [req-a18e0766-355f-467a-9c7b-af67c924fecd ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.180s 2020-12-05 13:23:56.423 38 DEBUG tempest.lib.common.rest_client [req-a18e0766-355f-467a-9c7b-af67c924fecd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a18e0766-355f-467a-9c7b-af67c924fecd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["1W0rdGz8QRKieHTilJXmqA"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.439 39 INFO tempest.lib.common.rest_client [req-b82a970b-3e77-4117-9573-f2ada6c10705 ] Request (LimitsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-12-05 13:23:56.439 39 DEBUG tempest.lib.common.rest_client [req-b82a970b-3e77-4117-9573-f2ada6c10705 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b82a970b-3e77-4117-9573-f2ada6c10705', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.451 40 INFO tempest.lib.common.rest_client [req-5e6172a8-82ff-4861-a2ef-59f6fc846a28 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-12-05 13:23:56.451 40 DEBUG tempest.lib.common.rest_client [req-5e6172a8-82ff-4861-a2ef-59f6fc846a28 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5e6172a8-82ff-4861-a2ef-59f6fc846a28', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.452 41 INFO tempest.lib.common.rest_client [req-ed02a21d-94c2-456c-ae49-528e77bffb0a ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1974838245 0.266s 2020-12-05 13:23:56.452 41 DEBUG tempest.lib.common.rest_client [req-ed02a21d-94c2-456c-ae49-528e77bffb0a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '708', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ed02a21d-94c2-456c-ae49-528e77bffb0a', 'x-compute-request-id': 'req-ed02a21d-94c2-456c-ae49-528e77bffb0a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1974838245'} Body: b'{"keypair": {"name": "tempest-KeypairsRbacTest-key-1974838245", "public_key": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdM6+VTipMPSeFhIfFquSyGxN4Dra/w1A0+XNnZduZhehF3YdL0YSWlC57ogU9HuYKPOs2jkq5orttUHu4ISHHan6WPPMu3XAkPPTNOap/CTTHw1eRFug1WA4efGNUKu2FohMO+Vkp/Hp5zcZu/Ro11iOGmbf+McXqaIfDUWxz8q7qWNLTl+68tB+XYAmm1Nr7G7egWkuLAFtbWpxPFrxARJrUYtlmhF7ErcA5ZyNmrUvU/C/sO/6J4LB8dnAeAgBQYuUbt/EJVucymVekyZPk233I5BFJp0Cau8JFtt12pLp0GK0kv0GVJC3XHlcNvYtsa7uBcZkRIcn3IY9tP4W5 Generated-by-Nova", "fingerprint": "c7:4c:b9:16:7d:3b:2d:09:f7:d9:96:2c:db:ff:04:52", "user_id": "fc1ac36dc4c74d21abba4bc0d6883d41", "created_at": "2020-12-05T13:23:56.000000", "deleted": false, "deleted_at": null, "id": 12503, "updated_at": null}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.455 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:56.506 38 INFO tempest.lib.common.rest_client [req-d24d8187-1cf9-4bc6-9f8f-b6df884a8b59 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.082s 2020-12-05 13:23:56.506 38 DEBUG tempest.lib.common.rest_client [req-d24d8187-1cf9-4bc6-9f8f-b6df884a8b59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d24d8187-1cf9-4bc6-9f8f-b6df884a8b59', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.542 39 INFO tempest.lib.common.rest_client [req-7f1fb796-0a2a-47c3-95f5-7c66ef8ba1e9 ] Request (LimitsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles/a629c95d64b3416fb80ae90af4f69c05 0.102s 2020-12-05 13:23:56.543 39 DEBUG tempest.lib.common.rest_client [req-7f1fb796-0a2a-47c3-95f5-7c66ef8ba1e9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f1fb796-0a2a-47c3-95f5-7c66ef8ba1e9', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.553 38 INFO tempest.lib.common.rest_client [req-7f4df318-c7a9-4d6c-965c-9b85c3b0c1cd ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-12-05 13:23:56.553 38 DEBUG tempest.lib.common.rest_client [req-7f4df318-c7a9-4d6c-965c-9b85c3b0c1cd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f4df318-c7a9-4d6c-965c-9b85c3b0c1cd', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.553 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:56.553 40 INFO tempest.lib.common.rest_client [req-88946360-5060-42ef-ad0f-b204e21d322b ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.101s 2020-12-05 13:23:56.554 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:56.554 40 DEBUG tempest.lib.common.rest_client [req-88946360-5060-42ef-ad0f-b204e21d322b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-FloatingIpPoolsRbacTest-897168351-desc", "domain_id": "default", "name": "tempest-FloatingIpPoolsRbacTest-897168351"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '382', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-88946360-5060-42ef-ad0f-b204e21d322b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1dc6141caf9f4cc39ade328791993a49", "name": "tempest-FloatingIpPoolsRbacTest-897168351", "domain_id": "default", "description": "tempest-FloatingIpPoolsRbacTest-897168351-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.575 41 INFO tempest.lib.common.rest_client [req-dc194cda-c14f-4fe6-8d25-a0d16c0ce599 ] Request (KeypairsRbacTest:test_show_keypair): 200 GET http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles 0.119s 2020-12-05 13:23:56.576 41 DEBUG tempest.lib.common.rest_client [req-dc194cda-c14f-4fe6-8d25-a0d16c0ce599 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dc194cda-c14f-4fe6-8d25-a0d16c0ce599', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83/users/fc1ac36dc4c74d21abba4bc0d6883d41/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.639 38 INFO tempest.lib.common.rest_client [req-56366a02-ab06-45d0-b1e3-abd216852202 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles 0.084s 2020-12-05 13:23:56.639 38 DEBUG tempest.lib.common.rest_client [req-56366a02-ab06-45d0-b1e3-abd216852202 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-56366a02-ab06-45d0-b1e3-abd216852202', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.654 41 INFO tempest.lib.common.rest_client [req-300f431e-0459-4af1-bf0c-45c90152a83f ] Request (KeypairsRbacTest:test_show_keypair): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:23:56.654 41 DEBUG tempest.lib.common.rest_client [req-300f431e-0459-4af1-bf0c-45c90152a83f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6622', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-300f431e-0459-4af1-bf0c-45c90152a83f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "fc1ac36dc4c74d21abba4bc0d6883d41", "name": "tempest-KeypairsRbacTest-136457460", "password_expires_at": null}, "audit_ids": ["TwoSX2vgTH68zN87iP0V1w"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "21b4c2314aed40c0aeda2a6804ed7a83", "name": "tempest-KeypairsRbacTest-136457460"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_21b4c2314aed40c0aeda2a6804ed7a83", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "pu _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.665 40 INFO tempest.lib.common.rest_client [req-55f4410f-6ccd-46aa-8b98-d6df5eb68126 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.110s 2020-12-05 13:23:56.666 40 DEBUG tempest.lib.common.rest_client [req-55f4410f-6ccd-46aa-8b98-d6df5eb68126 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-FloatingIpPoolsRbacTest-897168351", "password": "S0=nAS2H49GlBwZ", "project_id": "1dc6141caf9f4cc39ade328791993a49", "email": "tempest-FloatingIpPoolsRbacTest-1264659493@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '401', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-55f4410f-6ccd-46aa-8b98-d6df5eb68126', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1dc6141caf9f4cc39ade328791993a49", "email": "tempest-FloatingIpPoolsRbacTest-1264659493@example.com", "id": "d0fc8acee23148d68b21a4b50eefa9e9", "name": "tempest-FloatingIpPoolsRbacTest-897168351", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d0fc8acee23148d68b21a4b50eefa9e9"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.704 38 INFO tempest.lib.common.rest_client [req-74a02bac-d7e1-4b3c-8645-4b7e174a66ad ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles/72a4576c553448cd941b052c1ca0cf2d 0.064s 2020-12-05 13:23:56.704 38 DEBUG tempest.lib.common.rest_client [req-74a02bac-d7e1-4b3c-8645-4b7e174a66ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-74a02bac-d7e1-4b3c-8645-4b7e174a66ad', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.715 40 INFO tempest.lib.common.rest_client [req-b47cf10d-cc8e-4635-913c-b84784267579 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.048s 2020-12-05 13:23:56.716 40 DEBUG tempest.lib.common.rest_client [req-b47cf10d-cc8e-4635-913c-b84784267579 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b47cf10d-cc8e-4635-913c-b84784267579', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.802 38 INFO tempest.lib.common.rest_client [req-28b0d608-8556-4b52-a5da-62cdf0da38ae ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles/a629c95d64b3416fb80ae90af4f69c05 0.096s 2020-12-05 13:23:56.802 38 DEBUG tempest.lib.common.rest_client [req-28b0d608-8556-4b52-a5da-62cdf0da38ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-28b0d608-8556-4b52-a5da-62cdf0da38ae', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.818 40 INFO tempest.lib.common.rest_client [req-bf2e9fe6-00de-434f-8901-2a7c0a34b305 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.101s 2020-12-05 13:23:56.818 40 DEBUG tempest.lib.common.rest_client [req-bf2e9fe6-00de-434f-8901-2a7c0a34b305 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf2e9fe6-00de-434f-8901-2a7c0a34b305', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.913 41 INFO tempest.lib.common.rest_client [req-32f1e108-72e6-4790-b90b-08e4f1a2a2a8 ] Request (KeypairsRbacTest:_run_cleanups): 202 DELETE http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1974838245 0.258s 2020-12-05 13:23:56.914 41 DEBUG tempest.lib.common.rest_client [req-32f1e108-72e6-4790-b90b-08e4f1a2a2a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-32f1e108-72e6-4790-b90b-08e4f1a2a2a8', 'x-compute-request-id': 'req-32f1e108-72e6-4790-b90b-08e4f1a2a2a8', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-keypairs/tempest-KeypairsRbacTest-key-1974838245'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.932 40 INFO tempest.lib.common.rest_client [req-de676919-367c-43c4-b9db-3abd3c77ae53 ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles/72a4576c553448cd941b052c1ca0cf2d 0.113s 2020-12-05 13:23:56.933 40 DEBUG tempest.lib.common.rest_client [req-de676919-367c-43c4-b9db-3abd3c77ae53 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-de676919-367c-43c4-b9db-3abd3c77ae53', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:56.933 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpPoolsRbacTest-897168351', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1dc6141caf9f4cc39ade328791993a49', 'project_name': 'tempest-FloatingIpPoolsRbacTest-897168351', 'tenant_id': '1dc6141caf9f4cc39ade328791993a49', 'tenant_name': 'tempest-FloatingIpPoolsRbacTest-897168351', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd0fc8acee23148d68b21a4b50eefa9e9'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:56.934 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-FloatingIpPoolsRbacTest-897168351', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1dc6141caf9f4cc39ade328791993a49', 'project_name': 'tempest-FloatingIpPoolsRbacTest-897168351', 'tenant_id': '1dc6141caf9f4cc39ade328791993a49', 'tenant_name': 'tempest-FloatingIpPoolsRbacTest-897168351', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd0fc8acee23148d68b21a4b50eefa9e9'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:57.061 40 INFO tempest.lib.common.rest_client [req-3594ea7d-7384-4811-a547-d5425c2b42e1 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.115s 2020-12-05 13:23:57.062 40 DEBUG tempest.lib.common.rest_client [req-3594ea7d-7384-4811-a547-d5425c2b42e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6575', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3594ea7d-7384-4811-a547-d5425c2b42e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d0fc8acee23148d68b21a4b50eefa9e9", "name": "tempest-FloatingIpPoolsRbacTest-897168351", "password_expires_at": null}, "audit_ids": ["PQKNHJ2VSdWQXbnfdkvAiQ"], "expires_at": "2020-12-05T14:23:56.000000Z", "issued_at": "2020-12-05T13:23:56.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1dc6141caf9f4cc39ade328791993a49", "name": "tempest-FloatingIpPoolsRbacTest-897168351"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http:/ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.095 40 INFO tempest.lib.common.rest_client [req-187ca9af-ecaa-4a8c-af69-bd36261c19ad ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:57.096 40 DEBUG tempest.lib.common.rest_client [req-187ca9af-ecaa-4a8c-af69-bd36261c19ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-187ca9af-ecaa-4a8c-af69-bd36261c19ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["DahKA0giSuC8xK53k-ioeA"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.101 41 INFO tempest.lib.common.rest_client [req-95f0fe11-cb06-4b3a-a0e4-93b12c06eb07 ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/fc1ac36dc4c74d21abba4bc0d6883d41 0.182s 2020-12-05 13:23:57.102 41 DEBUG tempest.lib.common.rest_client [req-95f0fe11-cb06-4b3a-a0e4-93b12c06eb07 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:56 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-95f0fe11-cb06-4b3a-a0e4-93b12c06eb07', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/fc1ac36dc4c74d21abba4bc0d6883d41'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.183 40 INFO tempest.lib.common.rest_client [req-cf847a3f-b731-4543-8523-49bfcbcc73e1 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:23:57.183 40 DEBUG tempest.lib.common.rest_client [req-cf847a3f-b731-4543-8523-49bfcbcc73e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cf847a3f-b731-4543-8523-49bfcbcc73e1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["xzh0qj63Qd6cg3r6_V0m_w"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.190 41 INFO tempest.lib.common.rest_client [req-63e1fe31-8fb9-4779-b1e1-ec69bb0696fa ] Request (KeypairsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:23:57.190 41 DEBUG tempest.lib.common.rest_client [req-63e1fe31-8fb9-4779-b1e1-ec69bb0696fa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-63e1fe31-8fb9-4779-b1e1-ec69bb0696fa', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["aGGIuWS6RJ6hQh11VdPRyQ"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.231 40 INFO tempest.lib.common.rest_client [req-31668089-c04b-464e-8b78-a56ab085f7c0 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-12-05 13:23:57.232 40 DEBUG tempest.lib.common.rest_client [req-31668089-c04b-464e-8b78-a56ab085f7c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31668089-c04b-464e-8b78-a56ab085f7c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.280 40 INFO tempest.lib.common.rest_client [req-83ed4c07-a634-4247-9bd1-d76da3e49ee2 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-12-05 13:23:57.281 40 DEBUG tempest.lib.common.rest_client [req-83ed4c07-a634-4247-9bd1-d76da3e49ee2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-83ed4c07-a634-4247-9bd1-d76da3e49ee2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.281 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:57.282 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:57.331 40 INFO tempest.lib.common.rest_client [req-32fa74a9-d020-4f94-b681-f5ea03c8d397 ] Request (FloatingIpPoolsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles 0.048s 2020-12-05 13:23:57.332 40 DEBUG tempest.lib.common.rest_client [req-32fa74a9-d020-4f94-b681-f5ea03c8d397 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-32fa74a9-d020-4f94-b681-f5ea03c8d397', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.379 40 INFO tempest.lib.common.rest_client [req-6a0d5fe4-a683-44cc-84fc-28aa6c5baeb8 ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles/72a4576c553448cd941b052c1ca0cf2d 0.046s 2020-12-05 13:23:57.379 40 DEBUG tempest.lib.common.rest_client [req-6a0d5fe4-a683-44cc-84fc-28aa6c5baeb8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6a0d5fe4-a683-44cc-84fc-28aa6c5baeb8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.474 40 INFO tempest.lib.common.rest_client [req-a93348a0-d899-47df-9dc4-9ff6f4c4315f ] Request (FloatingIpPoolsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-12-05 13:23:57.474 40 DEBUG tempest.lib.common.rest_client [req-a93348a0-d899-47df-9dc4-9ff6f4c4315f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a93348a0-d899-47df-9dc4-9ff6f4c4315f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.507 41 INFO tempest.lib.common.rest_client [req-1bc83fa3-17df-4e94-8bf1-6e2949fb74e2 ] Request (KeypairsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21b4c2314aed40c0aeda2a6804ed7a83&name=default 0.315s 2020-12-05 13:23:57.507 41 DEBUG tempest.lib.common.rest_client [req-1bc83fa3-17df-4e94-8bf1-6e2949fb74e2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-1bc83fa3-17df-4e94-8bf1-6e2949fb74e2', 'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=21b4c2314aed40c0aeda2a6804ed7a83&name=default'} Body: b'{"security_groups": [{"id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "name": "default", "stateful": true, "tenant_id": "21b4c2314aed40c0aeda2a6804ed7a83", "description": "Default security group", "security_group_rules": [{"id": "62d460ad-3e32-4ea0-93be-87de44e1d1b6", "tenant_id": "21b4c2314aed40c0aeda2a6804ed7a83", "security_group_id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "description": null, "tags": [], "created_at": "2020-12-05T13:23:57Z", "updated_at": "2020-12-05T13:23:57Z", "revision_number": 0, "project_id": "21b4c2314aed40c0aeda2a6804ed7a83"}, {"id": "7dd62a77-81bc-4c3e-859f-5c86684e3e6e", "tenant_id": "21b4c2314aed40c0aeda2a6804ed7a83", "security_group_id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:57Z", "updated_at": "2020-12-05T13:23:57Z", "revision_number": 0, "project_id": "21b4c2314aed40c0aeda2a6804ed7a83"}, {"id": "d9495a1a-3274-4e6a-b01e-89fe0fd5ed26", "tenant_id": "21b4c2314aed40c0aeda2a6804ed7a83", "security_group_id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "description": null, "tags": [], "created_at": "2020-12-05T13:23:57Z", "updated_at": "2020-12-05T13:23:57Z", "revision_number": 0, "project_id": "21b4c2314aed40c0aeda2a6804ed7a83"}, {"id": "eba28465-2559-4324-8e75-329b13cce310", "tenant_id": "21b4c2314aed40c0aeda2a6804ed7a83", "security_group_id": "5f0124c8-9e0e-47ac-a73b-a15fb90ce358", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:57Z", "updated_at": "2020-12-05T13:23:57Z", "revision_number": 0, "project_id": "21b4c2314aed40c0aeda2a6804ed7a83"}], "tags": [], "created_at": "2020-12-05T13:23:57Z", "updated_at": "2020-12-05T13:23:57Z", "revision_number": 1, "project_id": "21b4c2314aed40c0aeda2a6804ed7a83"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.635 39 INFO tempest.lib.common.rest_client [req-9d29de4b-789e-4f4c-9312-b979b86520d1 ] Request (LimitsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:23:57.635 41 INFO tempest.lib.common.rest_client [req-0fac3e7a-4707-4ffb-aafe-2b1ccbcde556 ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5f0124c8-9e0e-47ac-a73b-a15fb90ce358 0.126s 2020-12-05 13:23:57.636 41 DEBUG tempest.lib.common.rest_client [req-0fac3e7a-4707-4ffb-aafe-2b1ccbcde556 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-0fac3e7a-4707-4ffb-aafe-2b1ccbcde556', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5f0124c8-9e0e-47ac-a73b-a15fb90ce358'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.636 39 DEBUG tempest.lib.common.rest_client [req-9d29de4b-789e-4f4c-9312-b979b86520d1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9d29de4b-789e-4f4c-9312-b979b86520d1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d38f84c57b8b46caa74a46154c0f3cad", "name": "tempest-LimitsRbacTest-1578118051", "password_expires_at": null}, "audit_ids": ["V5kFRwU8RxuGS1euLQ98lQ"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d308455ea2c45c29dd83d74af787692", "name": "tempest-LimitsRbacTest-1578118051"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.638 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:57.639 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.640 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.641 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.641 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.642 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.642 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.643 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.644 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.644 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.645 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.645 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.645 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.646 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.646 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.646 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.647 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.648 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.648 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.648 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.649 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.650 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.650 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.650 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.651 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.651 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.651 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.651 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.652 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.652 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.652 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.652 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.653 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.653 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.653 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.654 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.654 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.654 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.655 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.655 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.655 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.655 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.656 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.656 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.656 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.657 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.657 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.657 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.657 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.658 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.658 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.658 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.658 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.659 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.659 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.660 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.660 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.660 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.660 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.661 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.661 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.661 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.664 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:limits, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:57.664 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:57.771 39 INFO tempest.lib.common.rest_client [req-73e7798d-3506-40f3-a7e1-582df69ad701 ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles 0.106s 2020-12-05 13:23:57.771 39 DEBUG tempest.lib.common.rest_client [req-73e7798d-3506-40f3-a7e1-582df69ad701 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-73e7798d-3506-40f3-a7e1-582df69ad701', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.805 41 INFO tempest.lib.common.rest_client [req-f01f1c27-ff17-4b29-943e-2a77d1356fe1 ] Request (KeypairsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83 0.169s 2020-12-05 13:23:57.806 41 DEBUG tempest.lib.common.rest_client [req-f01f1c27-ff17-4b29-943e-2a77d1356fe1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f01f1c27-ff17-4b29-943e-2a77d1356fe1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/21b4c2314aed40c0aeda2a6804ed7a83'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.863 39 INFO tempest.lib.common.rest_client [req-16833293-98f0-4929-b387-e78c2df31633 ] Request (LimitsRbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-05 13:23:57.864 39 DEBUG tempest.lib.common.rest_client [req-16833293-98f0-4929-b387-e78c2df31633 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-16833293-98f0-4929-b387-e78c2df31633', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d38f84c57b8b46caa74a46154c0f3cad", "name": "tempest-LimitsRbacTest-1578118051", "password_expires_at": null}, "audit_ids": ["ulTgDaqiRsWLE00A9sb_gw"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d308455ea2c45c29dd83d74af787692", "name": "tempest-LimitsRbacTest-1578118051"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.893 41 INFO tempest.lib.common.rest_client [req-e0b60007-febf-4ce8-b86d-5e27e0fbe981 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:57.894 41 DEBUG tempest.lib.common.rest_client [req-e0b60007-febf-4ce8-b86d-5e27e0fbe981 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e0b60007-febf-4ce8-b86d-5e27e0fbe981', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["wAYnoSyeSr2UZxL4Xyknfw"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.899 38 INFO tempest.lib.common.rest_client [req-a336d949-ff31-469b-8f5e-d724760d3974 ] Request (InstanceUsagesAuditLogRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.095s 2020-12-05 13:23:57.900 38 DEBUG tempest.lib.common.rest_client [req-a336d949-ff31-469b-8f5e-d724760d3974 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a336d949-ff31-469b-8f5e-d724760d3974', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password_expires_at": null}, "audit_ids": ["IrVWEXikRrGVrGc2Cp48Cw"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.903 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:57.931 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.931 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.931 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.931 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.932 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.932 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.932 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.932 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.933 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.933 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.933 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.933 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.935 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.935 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.935 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.936 41 INFO tempest.lib.common.rest_client [req-8ddbf0d0-f32e-47a3-b89d-10f754e00098 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:57.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.937 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.937 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.937 41 DEBUG tempest.lib.common.rest_client [req-8ddbf0d0-f32e-47a3-b89d-10f754e00098 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8ddbf0d0-f32e-47a3-b89d-10f754e00098', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["_C3LDkO_Q_qTjDRpCjgM9w"], "expires_at": "2020-12-05T14:23:57.000000Z", "issued_at": "2020-12-05T13:23:57.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:57.937 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.937 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.939 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.939 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.939 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.939 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:57.949 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-usage-audit-log:list, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:57.949 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:57.985 41 INFO tempest.lib.common.rest_client [req-f9deee08-22a2-47c1-bf64-7a48f8e53640 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-12-05 13:23:57.986 41 DEBUG tempest.lib.common.rest_client [req-f9deee08-22a2-47c1-bf64-7a48f8e53640 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f9deee08-22a2-47c1-bf64-7a48f8e53640', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.002 38 INFO tempest.lib.common.rest_client [req-583cffc7-4841-4c5f-894a-fd4deee70a99 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles 0.052s 2020-12-05 13:23:58.002 38 DEBUG tempest.lib.common.rest_client [req-583cffc7-4841-4c5f-894a-fd4deee70a99 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-583cffc7-4841-4c5f-894a-fd4deee70a99', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.034 38 INFO tempest.lib.common.rest_client [req-b6bd2fa9-2c74-42eb-ae69-aa4463fa0293 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:58.034 38 DEBUG tempest.lib.common.rest_client [req-b6bd2fa9-2c74-42eb-ae69-aa4463fa0293 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b6bd2fa9-2c74-42eb-ae69-aa4463fa0293', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password_expires_at": null}, "audit_ids": ["AI3wVIGSQLiQdaNNiDRYmw"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.042 41 INFO tempest.lib.common.rest_client [req-fccb7669-75bd-482b-9959-c706cf3cfdb6 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.055s 2020-12-05 13:23:58.043 41 DEBUG tempest.lib.common.rest_client [req-fccb7669-75bd-482b-9959-c706cf3cfdb6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-MigrationsRbacTest-1991716178-desc", "domain_id": "default", "name": "tempest-MigrationsRbacTest-1991716178"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '374', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fccb7669-75bd-482b-9959-c706cf3cfdb6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "dfa98bc8ca6c489ab28d6371c4af05c3", "name": "tempest-MigrationsRbacTest-1991716178", "domain_id": "default", "description": "tempest-MigrationsRbacTest-1991716178-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.097 39 INFO tempest.lib.common.rest_client [req-5b776785-9f2e-4710-bab4-800a5bd1d08b ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/compute/v2.1/limits 0.232s 2020-12-05 13:23:58.098 39 DEBUG tempest.lib.common.rest_client [req-5b776785-9f2e-4710-bab4-800a5bd1d08b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:57 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '511', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5b776785-9f2e-4710-bab4-800a5bd1d08b', 'x-compute-request-id': 'req-5b776785-9f2e-4710-bab4-800a5bd1d08b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/limits'} Body: b'{"limits": {"rate": [], "absolute": {"maxTotalInstances": 10, "maxTotalCores": 20, "maxTotalRAMSize": 51200, "maxServerMeta": 128, "maxImageMeta": 128, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalKeypairs": 100, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.106 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:58.161 39 INFO tempest.lib.common.rest_client [req-3bab37aa-9055-4f36-9d31-8eb994de284e ] Request (LimitsRbacTest:test_show_limits): 200 GET http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles 0.054s 2020-12-05 13:23:58.162 39 DEBUG tempest.lib.common.rest_client [req-3bab37aa-9055-4f36-9d31-8eb994de284e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bab37aa-9055-4f36-9d31-8eb994de284e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692/users/d38f84c57b8b46caa74a46154c0f3cad/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.163 41 INFO tempest.lib.common.rest_client [req-c53aca30-eb57-4958-a6bd-ec23a793d4a5 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.119s 2020-12-05 13:23:58.164 41 DEBUG tempest.lib.common.rest_client [req-c53aca30-eb57-4958-a6bd-ec23a793d4a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-MigrationsRbacTest-1991716178", "password": "T3^RNK6z7q8jKEH", "project_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "email": "tempest-MigrationsRbacTest-141422538@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '391', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c53aca30-eb57-4958-a6bd-ec23a793d4a5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "email": "tempest-MigrationsRbacTest-141422538@example.com", "id": "e4195812ddde4d0184ba935d016466b0", "name": "tempest-MigrationsRbacTest-1991716178", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/e4195812ddde4d0184ba935d016466b0"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.221 41 INFO tempest.lib.common.rest_client [req-156762d8-d004-4e6c-82c7-97f0de0b8104 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-05 13:23:58.221 41 DEBUG tempest.lib.common.rest_client [req-156762d8-d004-4e6c-82c7-97f0de0b8104 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-156762d8-d004-4e6c-82c7-97f0de0b8104', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.238 39 INFO tempest.lib.common.rest_client [req-a93256e3-02dd-4585-a40b-2b0c5a9f82d7 ] Request (LimitsRbacTest:test_show_limits): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-05 13:23:58.238 38 INFO tempest.lib.common.rest_client [req-5ed79d1f-9f95-4cd1-8b6f-e0d4b332c4e8 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log 0.202s 2020-12-05 13:23:58.238 38 DEBUG tempest.lib.common.rest_client [req-5ed79d1f-9f95-4cd1-8b6f-e0d4b332c4e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '319', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ed79d1f-9f95-4cd1-8b6f-e0d4b332c4e8', 'x-compute-request-id': 'req-5ed79d1f-9f95-4cd1-8b6f-e0d4b332c4e8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log'} Body: b'{"instance_usage_audit_logs": {"period_beginning": "2020-12-05 12:00:00", "period_ending": "2020-12-05 13:00:00", "num_hosts": 0, "num_hosts_done": 0, "num_hosts_running": 0, "num_hosts_not_run": 0, "hosts_not_run": [], "total_instances": 0, "total_errors": 0, "overall_status": "ALL hosts done. 0 errors.", "log": {}}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.238 39 DEBUG tempest.lib.common.rest_client [req-a93256e3-02dd-4585-a40b-2b0c5a9f82d7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6620', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a93256e3-02dd-4585-a40b-2b0c5a9f82d7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d38f84c57b8b46caa74a46154c0f3cad", "name": "tempest-LimitsRbacTest-1578118051", "password_expires_at": null}, "audit_ids": ["URp8ch11SzaaP3ByzHEqAg"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "2d308455ea2c45c29dd83d74af787692", "name": "tempest-LimitsRbacTest-1578118051"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_2d308455ea2c45c29dd83d74af787692", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "publ _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.243 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:58.272 41 INFO tempest.lib.common.rest_client [req-a8237bec-98e2-4028-8368-d3db78a01a09 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.049s 2020-12-05 13:23:58.272 41 DEBUG tempest.lib.common.rest_client [req-a8237bec-98e2-4028-8368-d3db78a01a09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8237bec-98e2-4028-8368-d3db78a01a09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.286 38 INFO tempest.lib.common.rest_client [req-49c1c4a9-6be8-46f6-a5b9-6fdca459fbe3 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 200 GET http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles 0.042s 2020-12-05 13:23:58.286 38 DEBUG tempest.lib.common.rest_client [req-49c1c4a9-6be8-46f6-a5b9-6fdca459fbe3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-49c1c4a9-6be8-46f6-a5b9-6fdca459fbe3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.315 38 INFO tempest.lib.common.rest_client [req-be02a013-187f-4efd-b5c2-a2a9139712e0 ] Request (InstanceUsagesAuditLogRbacTest:test_list_instance_usage_audit_logs): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.029s 2020-12-05 13:23:58.316 38 DEBUG tempest.lib.common.rest_client [req-be02a013-187f-4efd-b5c2-a2a9139712e0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-be02a013-187f-4efd-b5c2-a2a9139712e0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password_expires_at": null}, "audit_ids": ["jdAjH5rlSgK_XdXY_ph3NA"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.321 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:58.322 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.322 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.323 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.323 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.324 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.325 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.325 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.325 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.326 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.326 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.326 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.327 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.327 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.328 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.328 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.329 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.329 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.330 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.330 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.331 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.331 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.332 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.332 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.333 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.333 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.334 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.335 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.336 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.337 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.338 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.339 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.340 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.341 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.342 41 INFO tempest.lib.common.rest_client [req-c1974901-c393-41ea-ad4f-40e066f0438f ] Request (MigrationsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles/72a4576c553448cd941b052c1ca0cf2d 0.068s 2020-12-05 13:23:58.342 41 DEBUG tempest.lib.common.rest_client [req-c1974901-c393-41ea-ad4f-40e066f0438f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c1974901-c393-41ea-ad4f-40e066f0438f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.342 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.343 41 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrationsRbacTest-1991716178', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'dfa98bc8ca6c489ab28d6371c4af05c3', 'project_name': 'tempest-MigrationsRbacTest-1991716178', 'tenant_id': 'dfa98bc8ca6c489ab28d6371c4af05c3', 'tenant_name': 'tempest-MigrationsRbacTest-1991716178', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e4195812ddde4d0184ba935d016466b0'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:58.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.343 41 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-MigrationsRbacTest-1991716178', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'dfa98bc8ca6c489ab28d6371c4af05c3', 'project_name': 'tempest-MigrationsRbacTest-1991716178', 'tenant_id': 'dfa98bc8ca6c489ab28d6371c4af05c3', 'tenant_name': 'tempest-MigrationsRbacTest-1991716178', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'e4195812ddde4d0184ba935d016466b0'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:58.343 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.344 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.345 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.346 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.347 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.348 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.349 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.350 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.350 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.351 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.352 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.352 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.353 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.354 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.354 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.355 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.355 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.356 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.356 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.357 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.358 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.359 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.360 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-instance-usage-audit-log:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:58.361 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:58.390 39 INFO tempest.lib.common.rest_client [req-3a341b51-5d45-483a-a34c-f778a0568b2b ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d38f84c57b8b46caa74a46154c0f3cad 0.147s 2020-12-05 13:23:58.390 39 DEBUG tempest.lib.common.rest_client [req-3a341b51-5d45-483a-a34c-f778a0568b2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a341b51-5d45-483a-a34c-f778a0568b2b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d38f84c57b8b46caa74a46154c0f3cad'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.456 41 INFO tempest.lib.common.rest_client [req-f04c737b-f81e-4894-84a1-591f70834092 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-05 13:23:58.456 41 DEBUG tempest.lib.common.rest_client [req-f04c737b-f81e-4894-84a1-591f70834092 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6567', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f04c737b-f81e-4894-84a1-591f70834092', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4195812ddde4d0184ba935d016466b0", "name": "tempest-MigrationsRbacTest-1991716178", "password_expires_at": null}, "audit_ids": ["FVRmFhQ2QKqAojCMbTOmmw"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfa98bc8ca6c489ab28d6371c4af05c3", "name": "tempest-MigrationsRbacTest-1991716178"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30. _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.464 38 INFO tempest.lib.common.rest_client [req-96d65aeb-6ecb-43f1-a9d4-cb318de7e5ae ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles 0.102s 2020-12-05 13:23:58.465 38 DEBUG tempest.lib.common.rest_client [req-96d65aeb-6ecb-43f1-a9d4-cb318de7e5ae ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-96d65aeb-6ecb-43f1-a9d4-cb318de7e5ae', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.475 39 INFO tempest.lib.common.rest_client [req-59e3d345-af4f-4a5b-b195-3de8eb1ba09e ] Request (LimitsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-05 13:23:58.476 39 DEBUG tempest.lib.common.rest_client [req-59e3d345-af4f-4a5b-b195-3de8eb1ba09e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-59e3d345-af4f-4a5b-b195-3de8eb1ba09e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["W_gm7LJmTEWpZp_kLm5I8A"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.497 41 INFO tempest.lib.common.rest_client [req-deb724b8-e8d7-4b50-9499-3fc455eda653 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:23:58.498 41 DEBUG tempest.lib.common.rest_client [req-deb724b8-e8d7-4b50-9499-3fc455eda653 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-deb724b8-e8d7-4b50-9499-3fc455eda653', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["eZbAGKW-RQeNSrfpuXLd-Q"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.537 41 INFO tempest.lib.common.rest_client [req-f88262d1-3c46-46ad-89fa-85f83bf8c58d ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:23:58.538 41 DEBUG tempest.lib.common.rest_client [req-f88262d1-3c46-46ad-89fa-85f83bf8c58d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f88262d1-3c46-46ad-89fa-85f83bf8c58d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["SusbAFwDSFSFrROJ4uPbNQ"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.549 38 INFO tempest.lib.common.rest_client [req-20f9bfc8-4f45-4f61-b7ad-b7e360bd55cf ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:58.549 38 DEBUG tempest.lib.common.rest_client [req-20f9bfc8-4f45-4f61-b7ad-b7e360bd55cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-20f9bfc8-4f45-4f61-b7ad-b7e360bd55cf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password_expires_at": null}, "audit_ids": ["MKLooHL9SOOqg3hoM2clUw"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.551 40 INFO tempest.lib.common.rest_client [req-75cfc32c-482b-44c1-a3ef-94368694adc3 ] Request (FloatingIpPoolsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-05 13:23:58.552 40 DEBUG tempest.lib.common.rest_client [req-75cfc32c-482b-44c1-a3ef-94368694adc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-75cfc32c-482b-44c1-a3ef-94368694adc3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d0fc8acee23148d68b21a4b50eefa9e9", "name": "tempest-FloatingIpPoolsRbacTest-897168351", "password_expires_at": null}, "audit_ids": ["jSig56bkRb6SWPC-zhoFtA"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1dc6141caf9f4cc39ade328791993a49", "name": "tempest-FloatingIpPoolsRbacTest-897168351"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.554 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:23:58.554 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.555 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.555 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.555 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.556 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.556 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.557 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.557 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.557 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.557 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.558 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.558 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.558 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.559 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.559 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.559 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.560 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.560 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.560 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.561 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.561 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.561 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.561 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.563 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.563 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.563 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.564 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.564 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.564 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.564 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.565 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.565 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.565 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.566 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.566 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.566 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.566 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.567 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.567 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.567 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.568 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.568 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.568 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.568 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.569 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.569 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.569 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.571 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.571 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.571 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.573 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.573 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.573 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:23:58.577 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-floating-ip-pools, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:23:58.577 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:58.586 41 INFO tempest.lib.common.rest_client [req-1ae5da12-4bff-4229-9752-9fe984aa4056 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.047s 2020-12-05 13:23:58.586 41 DEBUG tempest.lib.common.rest_client [req-1ae5da12-4bff-4229-9752-9fe984aa4056 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1ae5da12-4bff-4229-9752-9fe984aa4056', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.627 40 INFO tempest.lib.common.rest_client [req-098d9096-72d2-4502-80aa-39200add484e ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles 0.049s 2020-12-05 13:23:58.627 40 DEBUG tempest.lib.common.rest_client [req-098d9096-72d2-4502-80aa-39200add484e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-098d9096-72d2-4502-80aa-39200add484e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.639 41 INFO tempest.lib.common.rest_client [req-5f11eea5-7797-457c-b372-abdd919c753a ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-12-05 13:23:58.640 41 DEBUG tempest.lib.common.rest_client [req-5f11eea5-7797-457c-b372-abdd919c753a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5f11eea5-7797-457c-b372-abdd919c753a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.640 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:23:58.641 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:58.660 40 INFO tempest.lib.common.rest_client [req-6acb7f9f-3937-4873-8432-03381af6a0a8 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:23:58.661 40 DEBUG tempest.lib.common.rest_client [req-6acb7f9f-3937-4873-8432-03381af6a0a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6acb7f9f-3937-4873-8432-03381af6a0a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d0fc8acee23148d68b21a4b50eefa9e9", "name": "tempest-FloatingIpPoolsRbacTest-897168351", "password_expires_at": null}, "audit_ids": ["EWnS4yhZSEO0VbShkeCJYQ"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1dc6141caf9f4cc39ade328791993a49", "name": "tempest-FloatingIpPoolsRbacTest-897168351"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.695 41 INFO tempest.lib.common.rest_client [req-9ea0232e-0253-4132-bd5f-26060cee2b95 ] Request (MigrationsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles 0.053s 2020-12-05 13:23:58.695 41 DEBUG tempest.lib.common.rest_client [req-9ea0232e-0253-4132-bd5f-26060cee2b95 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9ea0232e-0253-4132-bd5f-26060cee2b95', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.703 38 INFO tempest.lib.common.rest_client [req-7146efa6-5637-4164-8886-f350665efd38 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log/2020-12-05%2013%3A23%3A58 0.152s 2020-12-05 13:23:58.704 38 DEBUG tempest.lib.common.rest_client [req-7146efa6-5637-4164-8886-f350665efd38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '318', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-7146efa6-5637-4164-8886-f350665efd38', 'x-compute-request-id': 'req-7146efa6-5637-4164-8886-f350665efd38', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-instance_usage_audit_log/2020-12-05%2013%3A23%3A58'} Body: b'{"instance_usage_audit_log": {"period_beginning": "2020-12-05 12:00:00", "period_ending": "2020-12-05 13:00:00", "num_hosts": 0, "num_hosts_done": 0, "num_hosts_running": 0, "num_hosts_not_run": 0, "hosts_not_run": [], "total_instances": 0, "total_errors": 0, "overall_status": "ALL hosts done. 0 errors.", "log": {}}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.710 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:58.755 41 INFO tempest.lib.common.rest_client [req-03a6334c-65f8-416d-9181-5c8d96e16ba5 ] Request (MigrationsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles/72a4576c553448cd941b052c1ca0cf2d 0.058s 2020-12-05 13:23:58.755 41 DEBUG tempest.lib.common.rest_client [req-03a6334c-65f8-416d-9181-5c8d96e16ba5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-03a6334c-65f8-416d-9181-5c8d96e16ba5', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.764 38 INFO tempest.lib.common.rest_client [req-3bedfb25-d48d-4694-80a4-41500592b2d5 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 200 GET http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles 0.053s 2020-12-05 13:23:58.764 38 DEBUG tempest.lib.common.rest_client [req-3bedfb25-d48d-4694-80a4-41500592b2d5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3bedfb25-d48d-4694-80a4-41500592b2d5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad/users/725781f9452a4b18bfc45d795d6cc7b6/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.842 38 INFO tempest.lib.common.rest_client [req-94a89e63-fe75-48ed-ae94-06bf816fe675 ] Request (InstanceUsagesAuditLogRbacTest:test_show_instance_usage_audit_log): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:23:58.843 38 DEBUG tempest.lib.common.rest_client [req-94a89e63-fe75-48ed-ae94-06bf816fe675 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6652', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-94a89e63-fe75-48ed-ae94-06bf816fe675', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "725781f9452a4b18bfc45d795d6cc7b6", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341", "password_expires_at": null}, "audit_ids": ["hRs2JD14RwyQmeAXwQTkFA"], "expires_at": "2020-12-05T14:23:58.000000Z", "issued_at": "2020-12-05T13:23:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fee49dda14d14ca08862c47f405e04ad", "name": "tempest-InstanceUsagesAuditLogRbacTest-1273865341"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fee49dda14d14ca08862c47f405e04ad", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.866 39 INFO tempest.lib.common.rest_client [req-e7f02868-0585-45d2-a546-d3c41f78ede8 ] Request (LimitsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2d308455ea2c45c29dd83d74af787692&name=default 0.389s 2020-12-05 13:23:58.866 39 DEBUG tempest.lib.common.rest_client [req-e7f02868-0585-45d2-a546-d3c41f78ede8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e7f02868-0585-45d2-a546-d3c41f78ede8', 'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=2d308455ea2c45c29dd83d74af787692&name=default'} Body: b'{"security_groups": [{"id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "name": "default", "stateful": true, "tenant_id": "2d308455ea2c45c29dd83d74af787692", "description": "Default security group", "security_group_rules": [{"id": "0e60b47c-2500-4965-81a8-bf1cac629930", "tenant_id": "2d308455ea2c45c29dd83d74af787692", "security_group_id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "description": null, "tags": [], "created_at": "2020-12-05T13:23:58Z", "updated_at": "2020-12-05T13:23:58Z", "revision_number": 0, "project_id": "2d308455ea2c45c29dd83d74af787692"}, {"id": "36cfb652-e10d-4677-b60b-a9f795d49f84", "tenant_id": "2d308455ea2c45c29dd83d74af787692", "security_group_id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "description": null, "tags": [], "created_at": "2020-12-05T13:23:58Z", "updated_at": "2020-12-05T13:23:58Z", "revision_number": 0, "project_id": "2d308455ea2c45c29dd83d74af787692"}, {"id": "40349c3b-4351-4b6f-878c-5a804e94209b", "tenant_id": "2d308455ea2c45c29dd83d74af787692", "security_group_id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:58Z", "updated_at": "2020-12-05T13:23:58Z", "revision_number": 0, "project_id": "2d308455ea2c45c29dd83d74af787692"}, {"id": "de05e433-2e37-42bd-a806-45567aa1d99d", "tenant_id": "2d308455ea2c45c29dd83d74af787692", "security_group_id": "d21e1a4c-2428-4b9d-861d-292d4fd47047", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:58Z", "updated_at": "2020-12-05T13:23:58Z", "revision_number": 0, "project_id": "2d308455ea2c45c29dd83d74af787692"}], "tags": [], "created_at": "2020-12-05T13:23:58Z", "updated_at": "2020-12-05T13:23:58Z", "revision_number": 1, "project_id": "2d308455ea2c45c29dd83d74af787692"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.866 41 INFO tempest.lib.common.rest_client [req-fd7a473f-6349-4e67-881d-939c1a5d181b ] Request (MigrationsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles/a629c95d64b3416fb80ae90af4f69c05 0.110s 2020-12-05 13:23:58.867 41 DEBUG tempest.lib.common.rest_client [req-fd7a473f-6349-4e67-881d-939c1a5d181b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd7a473f-6349-4e67-881d-939c1a5d181b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.939 40 INFO tempest.lib.common.rest_client [req-e44fcddb-36af-4336-aa55-4d8139b468ba ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/compute/v2.1/os-floating-ip-pools 0.277s 2020-12-05 13:23:58.940 40 DEBUG tempest.lib.common.rest_client [req-e44fcddb-36af-4336-aa55-4d8139b468ba ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '96', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e44fcddb-36af-4336-aa55-4d8139b468ba', 'x-compute-request-id': 'req-e44fcddb-36af-4336-aa55-4d8139b468ba', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-floating-ip-pools'} Body: b'{"floating_ip_pools": [{"name": "tempest-RoutersIpV6AdminTest-1081145424"}, {"name": "public"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:58.943 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:23:59.000 40 INFO tempest.lib.common.rest_client [req-160e0573-af1b-4686-80d3-c8f1fe7e721c ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 200 GET http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles 0.056s 2020-12-05 13:23:59.001 40 DEBUG tempest.lib.common.rest_client [req-160e0573-af1b-4686-80d3-c8f1fe7e721c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-160e0573-af1b-4686-80d3-c8f1fe7e721c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49/users/d0fc8acee23148d68b21a4b50eefa9e9/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.008 39 INFO tempest.lib.common.rest_client [req-954c3a91-1ea5-4f86-bee9-9a4087311599 ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/d21e1a4c-2428-4b9d-861d-292d4fd47047 0.141s 2020-12-05 13:23:59.009 39 DEBUG tempest.lib.common.rest_client [req-954c3a91-1ea5-4f86-bee9-9a4087311599 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-954c3a91-1ea5-4f86-bee9-9a4087311599', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/d21e1a4c-2428-4b9d-861d-292d4fd47047'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.046 38 INFO tempest.lib.common.rest_client [req-1f46fcca-a957-432b-8ddd-6b27b398aef7 ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/725781f9452a4b18bfc45d795d6cc7b6 0.198s 2020-12-05 13:23:59.047 38 DEBUG tempest.lib.common.rest_client [req-1f46fcca-a957-432b-8ddd-6b27b398aef7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:58 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1f46fcca-a957-432b-8ddd-6b27b398aef7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/725781f9452a4b18bfc45d795d6cc7b6'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.085 40 INFO tempest.lib.common.rest_client [req-b8dc994e-ceab-4fff-95c7-4a9247811339 ] Request (FloatingIpPoolsRbacTest:test_list_floating_ip_pools): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:23:59.086 40 DEBUG tempest.lib.common.rest_client [req-b8dc994e-ceab-4fff-95c7-4a9247811339 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6636', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b8dc994e-ceab-4fff-95c7-4a9247811339', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d0fc8acee23148d68b21a4b50eefa9e9", "name": "tempest-FloatingIpPoolsRbacTest-897168351", "password_expires_at": null}, "audit_ids": ["IHycm4D9RvO4gmRZQ_TaDA"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1dc6141caf9f4cc39ade328791993a49", "name": "tempest-FloatingIpPoolsRbacTest-897168351"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1dc6141caf9f4cc39ade328791993a49", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "i _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.130 38 INFO tempest.lib.common.rest_client [req-f4b8455b-47c6-451b-812c-22310f8edcaf ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:23:59.131 38 DEBUG tempest.lib.common.rest_client [req-f4b8455b-47c6-451b-812c-22310f8edcaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f4b8455b-47c6-451b-812c-22310f8edcaf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["_VvrzQuuR96n60pTfFDl1w"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.137 39 INFO tempest.lib.common.rest_client [req-becb417d-bcfb-4d04-b480-44fb396b825e ] Request (LimitsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692 0.128s 2020-12-05 13:23:59.138 39 DEBUG tempest.lib.common.rest_client [req-becb417d-bcfb-4d04-b480-44fb396b825e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-becb417d-bcfb-4d04-b480-44fb396b825e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/2d308455ea2c45c29dd83d74af787692'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.220 39 INFO tempest.lib.common.rest_client [req-781f9e01-7760-4286-9b72-33cf0f1e7e91 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:59.220 39 DEBUG tempest.lib.common.rest_client [req-781f9e01-7760-4286-9b72-33cf0f1e7e91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-781f9e01-7760-4286-9b72-33cf0f1e7e91', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["6A9dJ2r_S6CsFRpVi19w_g"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.262 39 INFO tempest.lib.common.rest_client [req-7fd7fe3b-372a-4cf7-b581-20fb41685e72 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:59.263 39 DEBUG tempest.lib.common.rest_client [req-7fd7fe3b-372a-4cf7-b581-20fb41685e72 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7fd7fe3b-372a-4cf7-b581-20fb41685e72', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["mSj7bXX0QSS5MsR8GjBWTw"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.318 39 INFO tempest.lib.common.rest_client [req-8a82b78d-6aa6-4df1-bfed-5b4d361670b9 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.054s 2020-12-05 13:23:59.318 39 DEBUG tempest.lib.common.rest_client [req-8a82b78d-6aa6-4df1-bfed-5b4d361670b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8a82b78d-6aa6-4df1-bfed-5b4d361670b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.332 40 INFO tempest.lib.common.rest_client [req-00c6d531-7dd1-4e05-ab15-a99a1badc1eb ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d0fc8acee23148d68b21a4b50eefa9e9 0.241s 2020-12-05 13:23:59.333 40 DEBUG tempest.lib.common.rest_client [req-00c6d531-7dd1-4e05-ab15-a99a1badc1eb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-00c6d531-7dd1-4e05-ab15-a99a1badc1eb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d0fc8acee23148d68b21a4b50eefa9e9'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.412 40 INFO tempest.lib.common.rest_client [req-0a2c6d8d-914d-4267-aa95-baba89c277a3 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:23:59.412 40 DEBUG tempest.lib.common.rest_client [req-0a2c6d8d-914d-4267-aa95-baba89c277a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a2c6d8d-914d-4267-aa95-baba89c277a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["6OXpZZTxR5y4X0Wg2OvEUA"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.446 39 INFO tempest.lib.common.rest_client [req-99163913-cbb5-4d16-939e-cf872b1b2a31 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.126s 2020-12-05 13:23:59.447 39 DEBUG tempest.lib.common.rest_client [req-99163913-cbb5-4d16-939e-cf872b1b2a31 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-179201651-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-179201651"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-99163913-cbb5-4d16-939e-cf872b1b2a31', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-179201651-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.512 38 INFO tempest.lib.common.rest_client [req-56f4dd90-c80a-4189-a401-9b56f0ed398b ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fee49dda14d14ca08862c47f405e04ad&name=default 0.380s 2020-12-05 13:23:59.512 38 DEBUG tempest.lib.common.rest_client [req-56f4dd90-c80a-4189-a401-9b56f0ed398b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-56f4dd90-c80a-4189-a401-9b56f0ed398b', 'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fee49dda14d14ca08862c47f405e04ad&name=default'} Body: b'{"security_groups": [{"id": "8128a90e-1866-43f4-88a7-23818135a153", "name": "default", "stateful": true, "tenant_id": "fee49dda14d14ca08862c47f405e04ad", "description": "Default security group", "security_group_rules": [{"id": "15d23789-4eec-4755-9a4c-995417aef485", "tenant_id": "fee49dda14d14ca08862c47f405e04ad", "security_group_id": "8128a90e-1866-43f4-88a7-23818135a153", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "fee49dda14d14ca08862c47f405e04ad"}, {"id": "4bd0aac6-be74-451c-8202-6e6193aae126", "tenant_id": "fee49dda14d14ca08862c47f405e04ad", "security_group_id": "8128a90e-1866-43f4-88a7-23818135a153", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8128a90e-1866-43f4-88a7-23818135a153", "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "fee49dda14d14ca08862c47f405e04ad"}, {"id": "e5e838bf-8c5f-42d1-a8d1-6d3333d905d9", "tenant_id": "fee49dda14d14ca08862c47f405e04ad", "security_group_id": "8128a90e-1866-43f4-88a7-23818135a153", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "8128a90e-1866-43f4-88a7-23818135a153", "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "fee49dda14d14ca08862c47f405e04ad"}, {"id": "fc807d44-c1fe-4d8a-80bc-cb63a4ee0599", "tenant_id": "fee49dda14d14ca08862c47f405e04ad", "security_group_id": "8128a90e-1866-43f4-88a7-23818135a153", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "fee49dda14d14ca08862c47f405e04ad"}], "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 1, "project_id": "fee49dda14d14ca08862c47f405e04ad"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.540 39 INFO tempest.lib.common.rest_client [req-90f6bd1d-24e4-444b-91de-c5942c8f1959 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.092s 2020-12-05 13:23:59.540 39 DEBUG tempest.lib.common.rest_client [req-90f6bd1d-24e4-444b-91de-c5942c8f1959 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesRbacTest-179201651", "password": "Y7&R!5^E5RtKI8V", "project_id": "eb6466377aee462f8d6d0407772f3707", "email": "tempest-QuotaClassesRbacTest-740945254@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '394', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90f6bd1d-24e4-444b-91de-c5942c8f1959', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "eb6466377aee462f8d6d0407772f3707", "email": "tempest-QuotaClassesRbacTest-740945254@example.com", "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bbcccefcea664d52a8505b3adbc6ff60"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.598 39 INFO tempest.lib.common.rest_client [req-3aa28d70-a89a-402e-bce6-cc231539bff7 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-05 13:23:59.598 39 DEBUG tempest.lib.common.rest_client [req-3aa28d70-a89a-402e-bce6-cc231539bff7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3aa28d70-a89a-402e-bce6-cc231539bff7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.650 39 INFO tempest.lib.common.rest_client [req-a0213553-bc65-4673-9a7e-9a1ccbae153d ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-05 13:23:59.651 39 DEBUG tempest.lib.common.rest_client [req-a0213553-bc65-4673-9a7e-9a1ccbae153d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0213553-bc65-4673-9a7e-9a1ccbae153d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.664 38 INFO tempest.lib.common.rest_client [req-da749f47-8a29-45be-a3d2-4c1e09b6becc ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/8128a90e-1866-43f4-88a7-23818135a153 0.150s 2020-12-05 13:23:59.664 38 DEBUG tempest.lib.common.rest_client [req-da749f47-8a29-45be-a3d2-4c1e09b6becc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-da749f47-8a29-45be-a3d2-4c1e09b6becc', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/8128a90e-1866-43f4-88a7-23818135a153'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.702 40 INFO tempest.lib.common.rest_client [req-6aead556-c70a-4d9d-88c0-a9d4e1f44029 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1dc6141caf9f4cc39ade328791993a49&name=default 0.289s 2020-12-05 13:23:59.703 40 DEBUG tempest.lib.common.rest_client [req-6aead556-c70a-4d9d-88c0-a9d4e1f44029 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-6aead556-c70a-4d9d-88c0-a9d4e1f44029', 'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1dc6141caf9f4cc39ade328791993a49&name=default'} Body: b'{"security_groups": [{"id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "name": "default", "stateful": true, "tenant_id": "1dc6141caf9f4cc39ade328791993a49", "description": "Default security group", "security_group_rules": [{"id": "56f49911-d955-43dc-99be-dfaf85722ac9", "tenant_id": "1dc6141caf9f4cc39ade328791993a49", "security_group_id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "1dc6141caf9f4cc39ade328791993a49"}, {"id": "7399ade4-b3ef-4c2b-aa6c-6f5db9aba570", "tenant_id": "1dc6141caf9f4cc39ade328791993a49", "security_group_id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "1dc6141caf9f4cc39ade328791993a49"}, {"id": "8a6f5b29-917f-476c-ad52-177b97f27ba6", "tenant_id": "1dc6141caf9f4cc39ade328791993a49", "security_group_id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "1dc6141caf9f4cc39ade328791993a49"}, {"id": "f4c79f5b-43ca-4ba3-b444-f9d134d7c225", "tenant_id": "1dc6141caf9f4cc39ade328791993a49", "security_group_id": "5c8508a8-7b9e-4f16-836a-d0bb21732f80", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 0, "project_id": "1dc6141caf9f4cc39ade328791993a49"}], "tags": [], "created_at": "2020-12-05T13:23:59Z", "updated_at": "2020-12-05T13:23:59Z", "revision_number": 1, "project_id": "1dc6141caf9f4cc39ade328791993a49"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.712 39 INFO tempest.lib.common.rest_client [req-2b6d1e42-74bf-49e6-bdd3-243da2944067 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-12-05 13:23:59.712 39 DEBUG tempest.lib.common.rest_client [req-2b6d1e42-74bf-49e6-bdd3-243da2944067 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b6d1e42-74bf-49e6-bdd3-243da2944067', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.712 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-179201651', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'eb6466377aee462f8d6d0407772f3707', 'project_name': 'tempest-QuotaClassesRbacTest-179201651', 'tenant_id': 'eb6466377aee462f8d6d0407772f3707', 'tenant_name': 'tempest-QuotaClassesRbacTest-179201651', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bbcccefcea664d52a8505b3adbc6ff60'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:59.713 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-179201651', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'eb6466377aee462f8d6d0407772f3707', 'project_name': 'tempest-QuotaClassesRbacTest-179201651', 'tenant_id': 'eb6466377aee462f8d6d0407772f3707', 'tenant_name': 'tempest-QuotaClassesRbacTest-179201651', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bbcccefcea664d52a8505b3adbc6ff60'}, Network: None, Subnet: None, Router: None 2020-12-05 13:23:59.795 38 INFO tempest.lib.common.rest_client [req-cee76ba0-f1d4-4195-a651-8d2eacb0d629 ] Request (InstanceUsagesAuditLogRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad 0.129s 2020-12-05 13:23:59.795 38 DEBUG tempest.lib.common.rest_client [req-cee76ba0-f1d4-4195-a651-8d2eacb0d629 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cee76ba0-f1d4-4195-a651-8d2eacb0d629', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fee49dda14d14ca08862c47f405e04ad'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.823 39 INFO tempest.lib.common.rest_client [req-ac2c68f9-9943-4d5a-a72b-32cea40a7c0d ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-05 13:23:59.824 39 DEBUG tempest.lib.common.rest_client [req-ac2c68f9-9943-4d5a-a72b-32cea40a7c0d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6569', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac2c68f9-9943-4d5a-a72b-32cea40a7c0d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "password_expires_at": null}, "audit_ids": ["3tks_KajRAam5QkB3oEuLw"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.3 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.828 40 INFO tempest.lib.common.rest_client [req-83a7b27c-0f14-43be-96e1-bfbf4a8a80e8 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/5c8508a8-7b9e-4f16-836a-d0bb21732f80 0.124s 2020-12-05 13:23:59.829 40 DEBUG tempest.lib.common.rest_client [req-83a7b27c-0f14-43be-96e1-bfbf4a8a80e8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-83a7b27c-0f14-43be-96e1-bfbf4a8a80e8', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/5c8508a8-7b9e-4f16-836a-d0bb21732f80'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.879 38 INFO tempest.lib.common.rest_client [req-deda4faa-e073-4547-b0db-e6a32d2d02ed ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:23:59.879 38 DEBUG tempest.lib.common.rest_client [req-deda4faa-e073-4547-b0db-e6a32d2d02ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-deda4faa-e073-4547-b0db-e6a32d2d02ed', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["w8yyfcbnTry7i4k0tomgmw"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.921 38 INFO tempest.lib.common.rest_client [req-da98cdc6-bdee-4c11-8657-811d9973686c ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:23:59.922 38 DEBUG tempest.lib.common.rest_client [req-da98cdc6-bdee-4c11-8657-811d9973686c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da98cdc6-bdee-4c11-8657-811d9973686c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["QOEaJmFpSZKLADmjrEq6YQ"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.940 39 INFO tempest.lib.common.rest_client [req-89426986-8822-4bda-a45a-fb09a06d8ed7 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.115s 2020-12-05 13:23:59.941 39 DEBUG tempest.lib.common.rest_client [req-89426986-8822-4bda-a45a-fb09a06d8ed7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-772508788-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-772508788"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '376', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-89426986-8822-4bda-a45a-fb09a06d8ed7', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "4d6646d116e64009af0619299ece3b78", "name": "tempest-QuotaClassesRbacTest-772508788", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-772508788-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/4d6646d116e64009af0619299ece3b78"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:23:59.969 38 INFO tempest.lib.common.rest_client [req-776e59fa-a337-4f7e-a2ec-7ae759d5601a ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.046s 2020-12-05 13:23:59.970 38 DEBUG tempest.lib.common.rest_client [req-776e59fa-a337-4f7e-a2ec-7ae759d5601a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-776e59fa-a337-4f7e-a2ec-7ae759d5601a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.013 40 INFO tempest.lib.common.rest_client [req-c762ae82-255b-4d42-b023-a43036f42dc3 ] Request (FloatingIpPoolsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49 0.183s 2020-12-05 13:24:00.014 40 DEBUG tempest.lib.common.rest_client [req-c762ae82-255b-4d42-b023-a43036f42dc3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c762ae82-255b-4d42-b023-a43036f42dc3', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1dc6141caf9f4cc39ade328791993a49'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.052 40 INFO tempest.lib.common.rest_client [req-b7cc04f9-f067-45e5-8702-a6309a96a43a ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:24:00.052 40 DEBUG tempest.lib.common.rest_client [req-b7cc04f9-f067-45e5-8702-a6309a96a43a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b7cc04f9-f067-45e5-8702-a6309a96a43a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["ZAxb8zyAT2OlaNR-jsxO5A"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.053 39 INFO tempest.lib.common.rest_client [req-31de6c6c-0d9e-43d5-a7d6-86c0432569a1 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-05 13:24:00.053 39 DEBUG tempest.lib.common.rest_client [req-31de6c6c-0d9e-43d5-a7d6-86c0432569a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaClassesRbacTest-772508788", "password": "W2+Ul@z%mbhS8e3", "project_id": "4d6646d116e64009af0619299ece3b78", "email": "tempest-QuotaClassesRbacTest-1978267131@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '395', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31de6c6c-0d9e-43d5-a7d6-86c0432569a1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "4d6646d116e64009af0619299ece3b78", "email": "tempest-QuotaClassesRbacTest-1978267131@example.com", "id": "7ff013e7ce044123928c1d288c712190", "name": "tempest-QuotaClassesRbacTest-772508788", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/7ff013e7ce044123928c1d288c712190"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.053 41 INFO tempest.lib.common.rest_client [req-a8614c01-1580-4ee4-b619-5cff68440770 ] Request (MigrationsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.185s 2020-12-05 13:24:00.054 41 DEBUG tempest.lib.common.rest_client [req-a8614c01-1580-4ee4-b619-5cff68440770 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a8614c01-1580-4ee4-b619-5cff68440770', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4195812ddde4d0184ba935d016466b0", "name": "tempest-MigrationsRbacTest-1991716178", "password_expires_at": null}, "audit_ids": ["AYa9tW5OTtCHax0cJWbO3w"], "expires_at": "2020-12-05T14:23:59.000000Z", "issued_at": "2020-12-05T13:23:59.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfa98bc8ca6c489ab28d6371c4af05c3", "name": "tempest-MigrationsRbacTest-1991716178"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.056 41 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'reader', 'admin', 'member'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:00.056 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.057 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.057 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.057 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.058 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.058 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.058 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.059 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.059 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.059 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.060 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.060 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.060 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.061 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.061 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.061 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.061 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.062 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.062 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.062 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.063 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.063 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.063 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.063 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.064 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.064 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.064 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.065 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.065 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.065 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.065 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.066 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.066 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.066 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.067 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.067 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.067 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.067 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.068 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.068 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.068 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.068 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.069 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.069 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.069 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.070 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.070 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.070 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.071 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.071 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.071 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.071 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.072 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.072 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.072 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.072 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.073 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.073 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.073 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.074 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.074 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.075 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.075 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.075 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.075 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.076 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.076 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.076 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.077 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.077 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.077 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.077 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.078 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.078 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.078 41 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:00.079 41 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-migrations:index, [Role]: ['reader', 'admin', 'member'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:00.079 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:00.082 38 INFO tempest.lib.common.rest_client [req-2fb1a279-e6ba-4b51-8cff-8b18a6dbd89e ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.111s 2020-12-05 13:24:00.082 38 DEBUG tempest.lib.common.rest_client [req-2fb1a279-e6ba-4b51-8cff-8b18a6dbd89e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-523392142-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-523392142"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:23:59 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2fb1a279-e6ba-4b51-8cff-8b18a6dbd89e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-523392142-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.106 39 INFO tempest.lib.common.rest_client [req-a82544a4-d65a-40b3-95c9-8f5912681825 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-05 13:24:00.107 39 DEBUG tempest.lib.common.rest_client [req-a82544a4-d65a-40b3-95c9-8f5912681825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a82544a4-d65a-40b3-95c9-8f5912681825', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.143 40 INFO tempest.lib.common.rest_client [req-78a2c519-9611-4c35-8249-5aed6572fd9d ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:24:00.144 40 DEBUG tempest.lib.common.rest_client [req-78a2c519-9611-4c35-8249-5aed6572fd9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-78a2c519-9611-4c35-8249-5aed6572fd9d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["q1bI0vMLQSmwEYVV4hPkSg"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.184 41 INFO tempest.lib.common.rest_client [req-fa14f8f4-ee24-4f64-9b98-5196259970d3 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles 0.104s 2020-12-05 13:24:00.185 41 DEBUG tempest.lib.common.rest_client [req-fa14f8f4-ee24-4f64-9b98-5196259970d3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa14f8f4-ee24-4f64-9b98-5196259970d3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.195 40 INFO tempest.lib.common.rest_client [req-25666d07-d930-43e2-8eca-9931b7845b68 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.050s 2020-12-05 13:24:00.195 40 DEBUG tempest.lib.common.rest_client [req-25666d07-d930-43e2-8eca-9931b7845b68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-25666d07-d930-43e2-8eca-9931b7845b68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.195 38 INFO tempest.lib.common.rest_client [req-dea7c831-7742-4516-85d9-806e51b07754 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.111s 2020-12-05 13:24:00.196 38 DEBUG tempest.lib.common.rest_client [req-dea7c831-7742-4516-85d9-806e51b07754 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaSetsRbacTest-523392142", "password": "W1+dwnTf9%TmeN%", "project_id": "1ee7c45edd2f4d50ac53c9ae24068787", "email": "tempest-QuotaSetsRbacTest-1215099543@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-dea7c831-7742-4516-85d9-806e51b07754', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1ee7c45edd2f4d50ac53c9ae24068787", "email": "tempest-QuotaSetsRbacTest-1215099543@example.com", "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/d744e1fde8ac4c63b6c6d1f9ef856a8e"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.238 38 INFO tempest.lib.common.rest_client [req-afe8b20d-d935-46cd-80f1-1008c53079aa ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-12-05 13:24:00.239 38 DEBUG tempest.lib.common.rest_client [req-afe8b20d-d935-46cd-80f1-1008c53079aa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-afe8b20d-d935-46cd-80f1-1008c53079aa', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.242 39 INFO tempest.lib.common.rest_client [req-3df6f2c2-75d7-4536-acf0-7740579a7c64 ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/4d6646d116e64009af0619299ece3b78/users/7ff013e7ce044123928c1d288c712190/roles/a629c95d64b3416fb80ae90af4f69c05 0.134s 2020-12-05 13:24:00.242 39 DEBUG tempest.lib.common.rest_client [req-3df6f2c2-75d7-4536-acf0-7740579a7c64 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3df6f2c2-75d7-4536-acf0-7740579a7c64', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d6646d116e64009af0619299ece3b78/users/7ff013e7ce044123928c1d288c712190/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.243 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-772508788', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4d6646d116e64009af0619299ece3b78', 'project_name': 'tempest-QuotaClassesRbacTest-772508788', 'tenant_id': '4d6646d116e64009af0619299ece3b78', 'tenant_name': 'tempest-QuotaClassesRbacTest-772508788', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7ff013e7ce044123928c1d288c712190'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.244 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaClassesRbacTest-772508788', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '4d6646d116e64009af0619299ece3b78', 'project_name': 'tempest-QuotaClassesRbacTest-772508788', 'tenant_id': '4d6646d116e64009af0619299ece3b78', 'tenant_name': 'tempest-QuotaClassesRbacTest-772508788', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '7ff013e7ce044123928c1d288c712190'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.254 40 INFO tempest.lib.common.rest_client [req-937cd2dc-c53a-4738-8ea2-092c58075666 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.058s 2020-12-05 13:24:00.254 40 DEBUG tempest.lib.common.rest_client [req-937cd2dc-c53a-4738-8ea2-092c58075666 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-HypervisorMaxv252RbacTest-1638954229-desc", "domain_id": "default", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-937cd2dc-c53a-4738-8ea2-092c58075666', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "domain_id": "default", "description": "tempest-HypervisorMaxv252RbacTest-1638954229-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.269 41 INFO tempest.lib.common.rest_client [req-e3530607-0d10-489e-9bb8-d52cd2b1dad4 ] Request (MigrationsRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.083s 2020-12-05 13:24:00.269 41 DEBUG tempest.lib.common.rest_client [req-e3530607-0d10-489e-9bb8-d52cd2b1dad4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e3530607-0d10-489e-9bb8-d52cd2b1dad4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4195812ddde4d0184ba935d016466b0", "name": "tempest-MigrationsRbacTest-1991716178", "password_expires_at": null}, "audit_ids": ["9WUUCndrSfaXho9hFaDoqA"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfa98bc8ca6c489ab28d6371c4af05c3", "name": "tempest-MigrationsRbacTest-1991716178"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.348 38 INFO tempest.lib.common.rest_client [req-0174e92b-05aa-4760-962b-9274d690a4b3 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.108s 2020-12-05 13:24:00.349 38 DEBUG tempest.lib.common.rest_client [req-0174e92b-05aa-4760-962b-9274d690a4b3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0174e92b-05aa-4760-962b-9274d690a4b3', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.361 39 INFO tempest.lib.common.rest_client [req-4170f126-40e9-4f5d-8d9b-603950e29338 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-05 13:24:00.361 39 DEBUG tempest.lib.common.rest_client [req-4170f126-40e9-4f5d-8d9b-603950e29338 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4170f126-40e9-4f5d-8d9b-603950e29338', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "7ff013e7ce044123928c1d288c712190", "name": "tempest-QuotaClassesRbacTest-772508788", "password_expires_at": null}, "audit_ids": ["K-Sb5HKHSoC0Ma-J06khNA"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "4d6646d116e64009af0619299ece3b78", "name": "tempest-QuotaClassesRbacTest-772508788"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/4d6646d116e64009af0619299ece3b78", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/4d6646d116e64009af0619299ece3b78", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/4d6646d116e64009af0619299ece3b78", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d6646d116e64009af0619299ece3b78", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d6646d116e64009af0619299ece3b78", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_4d6646d116e64009af0619299ece3b78", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.396 39 INFO tempest.lib.common.rest_client [req-d48f2694-f998-4f28-8cb0-70a29f0b02a8 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.033s 2020-12-05 13:24:00.397 39 DEBUG tempest.lib.common.rest_client [req-d48f2694-f998-4f28-8cb0-70a29f0b02a8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d48f2694-f998-4f28-8cb0-70a29f0b02a8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["osZSPhiITOWx67U5uXW3wQ"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.397 40 INFO tempest.lib.common.rest_client [req-3a1835fe-a03e-4a0e-a900-9459625d716e ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.141s 2020-12-05 13:24:00.397 40 DEBUG tempest.lib.common.rest_client [req-3a1835fe-a03e-4a0e-a900-9459625d716e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password": "E4%4DLia1^f4C~Z", "project_id": "46a1eb551ec7443e9cacfebfa71b659d", "email": "tempest-HypervisorMaxv252RbacTest-1172585084@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '406', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a1835fe-a03e-4a0e-a900-9459625d716e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "46a1eb551ec7443e9cacfebfa71b659d", "email": "tempest-HypervisorMaxv252RbacTest-1172585084@example.com", "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5dbac16d37ec4528b0d0266893326e47"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.413 38 INFO tempest.lib.common.rest_client [req-bbbfd49b-3ca1-492e-b33f-e87783351e9b ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles/72a4576c553448cd941b052c1ca0cf2d 0.062s 2020-12-05 13:24:00.414 38 DEBUG tempest.lib.common.rest_client [req-bbbfd49b-3ca1-492e-b33f-e87783351e9b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bbbfd49b-3ca1-492e-b33f-e87783351e9b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.414 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-523392142', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1ee7c45edd2f4d50ac53c9ae24068787', 'project_name': 'tempest-QuotaSetsRbacTest-523392142', 'tenant_id': '1ee7c45edd2f4d50ac53c9ae24068787', 'tenant_name': 'tempest-QuotaSetsRbacTest-523392142', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd744e1fde8ac4c63b6c6d1f9ef856a8e'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.415 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-523392142', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1ee7c45edd2f4d50ac53c9ae24068787', 'project_name': 'tempest-QuotaSetsRbacTest-523392142', 'tenant_id': '1ee7c45edd2f4d50ac53c9ae24068787', 'tenant_name': 'tempest-QuotaSetsRbacTest-523392142', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'd744e1fde8ac4c63b6c6d1f9ef856a8e'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.460 41 INFO tempest.lib.common.rest_client [req-3da1ebc5-0b52-49b8-b73c-aa5d9e262b40 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/compute/v2.1/os-migrations 0.189s 2020-12-05 13:24:00.460 41 DEBUG tempest.lib.common.rest_client [req-3da1ebc5-0b52-49b8-b73c-aa5d9e262b40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-3da1ebc5-0b52-49b8-b73c-aa5d9e262b40', 'x-compute-request-id': 'req-3da1ebc5-0b52-49b8-b73c-aa5d9e262b40', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-migrations'} Body: b'{"migrations": [{"id": 4764, "source_compute": "lf-virtual8", "dest_compute": "lf-virtual9", "source_node": "lf-virtual8", "dest_node": "lf-virtual9", "dest_host": "172.30.13.94", "old_instance_type_id": 7733, "new_instance_type_id": 7734, "instance_uuid": "781deef8-04d6-49a3-9628-c0ececc41b21", "status": "confirmed", "created_at": "2020-12-05T13:17:39.000000", "updated_at": "2020-12-05T13:17:54.000000"}, {"id": 4767, "source_compute": "lf-virtual8", "dest_compute": "lf-virtual9", "source_node": "lf-virtual8", "dest_node": "lf-virtual9", "dest_host": "172.30.13.94", "old_instance_type_id": 7733, "new_instance_type_id": 7734, "instance_uuid": "781deef8-04d6-49a3-9628-c0ececc41b21", "status": "finished", "created_at": "2020-12-05T13:19:09.000000", "updated_at": "2020-12-05T13:19:21.000000"}, {"id": 4765, "source_compute": "lf-virtual9", "dest_compute": "lf-virtual8", "source_node": "lf-virtual9", "dest_node": "lf-virtual8", "dest_host": "172.30.13.93", "old_instance_type_id": 7734, "new_instance_type_id": 7733, "instance_uuid": "781deef8-04d6-49a3-9628-c0ececc41b21", "status": "confirmed", "created_at": "2020-12-05T13:17:57.000000", "updated_at": "2020-12-05T13:18:14.000000"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.465 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:00.484 39 INFO tempest.lib.common.rest_client [req-fa654d60-d2f4-4bc7-b31c-8181f0184eb3 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.075s 2020-12-05 13:24:00.484 39 DEBUG tempest.lib.common.rest_client [req-fa654d60-d2f4-4bc7-b31c-8181f0184eb3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fa654d60-d2f4-4bc7-b31c-8181f0184eb3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["8oalQHybQ-2WWqlP40tNUQ"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.508 40 INFO tempest.lib.common.rest_client [req-9b4fdd24-f32b-4bc5-b939-e0e1de6acb69 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.109s 2020-12-05 13:24:00.508 40 DEBUG tempest.lib.common.rest_client [req-9b4fdd24-f32b-4bc5-b939-e0e1de6acb69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9b4fdd24-f32b-4bc5-b939-e0e1de6acb69', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.530 39 INFO tempest.lib.common.rest_client [req-d7d7df1d-2322-4a35-9740-f33c1c8c336e ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.045s 2020-12-05 13:24:00.531 39 DEBUG tempest.lib.common.rest_client [req-d7d7df1d-2322-4a35-9740-f33c1c8c336e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d7d7df1d-2322-4a35-9740-f33c1c8c336e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.546 38 INFO tempest.lib.common.rest_client [req-b99fe419-6c22-4929-8a43-8c454088473d ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.117s 2020-12-05 13:24:00.546 38 DEBUG tempest.lib.common.rest_client [req-b99fe419-6c22-4929-8a43-8c454088473d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b99fe419-6c22-4929-8a43-8c454088473d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["98_BJ5nyQCK3vFM00tUhLw"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.556 41 INFO tempest.lib.common.rest_client [req-a513605e-e795-43a8-9fd0-86101bf3f645 ] Request (MigrationsRbacTest:test_list_services): 200 GET http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles 0.090s 2020-12-05 13:24:00.556 41 DEBUG tempest.lib.common.rest_client [req-a513605e-e795-43a8-9fd0-86101bf3f645 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a513605e-e795-43a8-9fd0-86101bf3f645', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3/users/e4195812ddde4d0184ba935d016466b0/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.557 40 INFO tempest.lib.common.rest_client [req-91e68e40-4ba2-4190-ad63-29246518267e ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.047s 2020-12-05 13:24:00.557 40 DEBUG tempest.lib.common.rest_client [req-91e68e40-4ba2-4190-ad63-29246518267e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-91e68e40-4ba2-4190-ad63-29246518267e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.576 39 INFO tempest.lib.common.rest_client [req-52b30991-42a9-48ca-99ba-ee03ce5cd3af ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.044s 2020-12-05 13:24:00.576 39 DEBUG tempest.lib.common.rest_client [req-52b30991-42a9-48ca-99ba-ee03ce5cd3af ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52b30991-42a9-48ca-99ba-ee03ce5cd3af', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.576 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:24:00.577 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:00.604 38 INFO tempest.lib.common.rest_client [req-39823ded-6304-47a8-b93d-f6b14e5bc9a3 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.055s 2020-12-05 13:24:00.604 38 DEBUG tempest.lib.common.rest_client [req-39823ded-6304-47a8-b93d-f6b14e5bc9a3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-501824699-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-501824699"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-39823ded-6304-47a8-b93d-f6b14e5bc9a3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "1072a955035749bcb4553040c2a94524", "name": "tempest-QuotaSetsRbacTest-501824699", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-501824699-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/1072a955035749bcb4553040c2a94524"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.619 40 INFO tempest.lib.common.rest_client [req-da6e751c-36cd-459d-8802-c2124efb05f2 ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles/72a4576c553448cd941b052c1ca0cf2d 0.060s 2020-12-05 13:24:00.619 40 DEBUG tempest.lib.common.rest_client [req-da6e751c-36cd-459d-8802-c2124efb05f2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-da6e751c-36cd-459d-8802-c2124efb05f2', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.620 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorMaxv252RbacTest-1638954229', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '46a1eb551ec7443e9cacfebfa71b659d', 'project_name': 'tempest-HypervisorMaxv252RbacTest-1638954229', 'tenant_id': '46a1eb551ec7443e9cacfebfa71b659d', 'tenant_name': 'tempest-HypervisorMaxv252RbacTest-1638954229', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5dbac16d37ec4528b0d0266893326e47'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.620 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-HypervisorMaxv252RbacTest-1638954229', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '46a1eb551ec7443e9cacfebfa71b659d', 'project_name': 'tempest-HypervisorMaxv252RbacTest-1638954229', 'tenant_id': '46a1eb551ec7443e9cacfebfa71b659d', 'tenant_name': 'tempest-HypervisorMaxv252RbacTest-1638954229', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5dbac16d37ec4528b0d0266893326e47'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.624 39 INFO tempest.lib.common.rest_client [req-e4c1ee32-eb7a-4b2d-a2ca-5c763357441c ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles 0.046s 2020-12-05 13:24:00.624 39 DEBUG tempest.lib.common.rest_client [req-e4c1ee32-eb7a-4b2d-a2ca-5c763357441c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e4c1ee32-eb7a-4b2d-a2ca-5c763357441c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.634 41 INFO tempest.lib.common.rest_client [req-8f1f838d-1c76-4fe5-8a44-a799a5113ded ] Request (MigrationsRbacTest:test_list_services): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:24:00.635 41 DEBUG tempest.lib.common.rest_client [req-8f1f838d-1c76-4fe5-8a44-a799a5113ded ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6628', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f1f838d-1c76-4fe5-8a44-a799a5113ded', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "e4195812ddde4d0184ba935d016466b0", "name": "tempest-MigrationsRbacTest-1991716178", "password_expires_at": null}, "audit_ids": ["Rm5FkmbNSm2UL8ZkdSwivA"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "dfa98bc8ca6c489ab28d6371c4af05c3", "name": "tempest-MigrationsRbacTest-1991716178"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_dfa98bc8ca6c489ab28d6371c4af05c3", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.712 38 INFO tempest.lib.common.rest_client [req-66eef69b-98cc-4535-a0a4-cf559301c22c ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.106s 2020-12-05 13:24:00.712 38 DEBUG tempest.lib.common.rest_client [req-66eef69b-98cc-4535-a0a4-cf559301c22c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-QuotaSetsRbacTest-501824699", "password": "X8@@Bh_U_m~VtPY", "project_id": "1072a955035749bcb4553040c2a94524", "email": "tempest-QuotaSetsRbacTest-1230859597@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '389', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-66eef69b-98cc-4535-a0a4-cf559301c22c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "1072a955035749bcb4553040c2a94524", "email": "tempest-QuotaSetsRbacTest-1230859597@example.com", "id": "5f8a6514f9e148fb8f2869e7da84347d", "name": "tempest-QuotaSetsRbacTest-501824699", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/5f8a6514f9e148fb8f2869e7da84347d"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.722 39 INFO tempest.lib.common.rest_client [req-6b2ad945-b0f7-4ffa-80ac-b5fb6479210c ] Request (QuotaClassesRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles/72a4576c553448cd941b052c1ca0cf2d 0.097s 2020-12-05 13:24:00.723 39 DEBUG tempest.lib.common.rest_client [req-6b2ad945-b0f7-4ffa-80ac-b5fb6479210c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6b2ad945-b0f7-4ffa-80ac-b5fb6479210c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.725 40 INFO tempest.lib.common.rest_client [req-8bb088f1-b645-4873-a37c-2be8f218eb73 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-05 13:24:00.725 40 DEBUG tempest.lib.common.rest_client [req-8bb088f1-b645-4873-a37c-2be8f218eb73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6581', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bb088f1-b645-4873-a37c-2be8f218eb73', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password_expires_at": null}, "audit_ids": ["TMjSF0_ITKynuKK6KQifsg"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.813 41 INFO tempest.lib.common.rest_client [req-93020c1a-885f-41af-a34c-64e61db39802 ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/e4195812ddde4d0184ba935d016466b0 0.173s 2020-12-05 13:24:00.813 41 DEBUG tempest.lib.common.rest_client [req-93020c1a-885f-41af-a34c-64e61db39802 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-93020c1a-885f-41af-a34c-64e61db39802', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/e4195812ddde4d0184ba935d016466b0'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.814 38 INFO tempest.lib.common.rest_client [req-40babd3e-0772-4319-a450-75901e5235ed ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.101s 2020-12-05 13:24:00.815 38 DEBUG tempest.lib.common.rest_client [req-40babd3e-0772-4319-a450-75901e5235ed ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-40babd3e-0772-4319-a450-75901e5235ed', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.817 40 INFO tempest.lib.common.rest_client [req-76a4a97d-e9e2-402d-94ec-e45a983a6478 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:24:00.818 40 DEBUG tempest.lib.common.rest_client [req-76a4a97d-e9e2-402d-94ec-e45a983a6478 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76a4a97d-e9e2-402d-94ec-e45a983a6478', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["yIbjAhvlQjygJf2AjDChgg"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.818 39 INFO tempest.lib.common.rest_client [req-6166abf1-c43e-4738-a037-2704d6e8797f ] Request (QuotaClassesRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles/a629c95d64b3416fb80ae90af4f69c05 0.094s 2020-12-05 13:24:00.819 39 DEBUG tempest.lib.common.rest_client [req-6166abf1-c43e-4738-a037-2704d6e8797f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6166abf1-c43e-4738-a037-2704d6e8797f', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.896 41 INFO tempest.lib.common.rest_client [req-ee20a5e8-934d-423b-90f3-bab13e4778f3 ] Request (MigrationsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:24:00.896 41 DEBUG tempest.lib.common.rest_client [req-ee20a5e8-934d-423b-90f3-bab13e4778f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee20a5e8-934d-423b-90f3-bab13e4778f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["_8eoC8_4RmOhO31EKvxy_Q"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.916 38 INFO tempest.lib.common.rest_client [req-8bb90722-5bba-43c7-8edc-d5798c42d637 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1072a955035749bcb4553040c2a94524/users/5f8a6514f9e148fb8f2869e7da84347d/roles/a629c95d64b3416fb80ae90af4f69c05 0.101s 2020-12-05 13:24:00.916 38 DEBUG tempest.lib.common.rest_client [req-8bb90722-5bba-43c7-8edc-d5798c42d637 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8bb90722-5bba-43c7-8edc-d5798c42d637', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1072a955035749bcb4553040c2a94524/users/5f8a6514f9e148fb8f2869e7da84347d/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:00.917 38 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-501824699', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1072a955035749bcb4553040c2a94524', 'project_name': 'tempest-QuotaSetsRbacTest-501824699', 'tenant_id': '1072a955035749bcb4553040c2a94524', 'tenant_name': 'tempest-QuotaSetsRbacTest-501824699', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5f8a6514f9e148fb8f2869e7da84347d'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.917 38 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-QuotaSetsRbacTest-501824699', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '1072a955035749bcb4553040c2a94524', 'project_name': 'tempest-QuotaSetsRbacTest-501824699', 'tenant_id': '1072a955035749bcb4553040c2a94524', 'tenant_name': 'tempest-QuotaSetsRbacTest-501824699', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '5f8a6514f9e148fb8f2869e7da84347d'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:00.931 40 INFO tempest.lib.common.rest_client [req-4758db95-0368-4b0d-b0bf-bcf6c18b3f69 ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.102s 2020-12-05 13:24:00.931 40 DEBUG tempest.lib.common.rest_client [req-4758db95-0368-4b0d-b0bf-bcf6c18b3f69 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4758db95-0368-4b0d-b0bf-bcf6c18b3f69', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["kXjr14XKQxadFUA6BPBYtQ"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.011 40 INFO tempest.lib.common.rest_client [req-338b0dde-a032-46ec-ae1b-0c5674f83bc9 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.079s 2020-12-05 13:24:01.012 40 DEBUG tempest.lib.common.rest_client [req-338b0dde-a032-46ec-ae1b-0c5674f83bc9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-338b0dde-a032-46ec-ae1b-0c5674f83bc9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.021 38 INFO tempest.lib.common.rest_client [req-ec2a1619-6f59-473c-876c-1dd3166e3620 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-05 13:24:01.021 38 DEBUG tempest.lib.common.rest_client [req-ec2a1619-6f59-473c-876c-1dd3166e3620 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:00 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ec2a1619-6f59-473c-876c-1dd3166e3620', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5f8a6514f9e148fb8f2869e7da84347d", "name": "tempest-QuotaSetsRbacTest-501824699", "password_expires_at": null}, "audit_ids": ["H3vCYglNTTmWxz6Y3D7T6A"], "expires_at": "2020-12-05T14:24:00.000000Z", "issued_at": "2020-12-05T13:24:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1072a955035749bcb4553040c2a94524", "name": "tempest-QuotaSetsRbacTest-501824699"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1072a955035749bcb4553040c2a94524", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1072a955035749bcb4553040c2a94524", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1072a955035749bcb4553040c2a94524", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1072a955035749bcb4553040c2a94524", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1072a955035749bcb4553040c2a94524", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1072a955035749bcb4553040c2a94524", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.047 38 INFO tempest.lib.common.rest_client [req-452e66e6-1e31-4d37-ac45-f19bbd4aaedf ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.024s 2020-12-05 13:24:01.047 38 DEBUG tempest.lib.common.rest_client [req-452e66e6-1e31-4d37-ac45-f19bbd4aaedf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-452e66e6-1e31-4d37-ac45-f19bbd4aaedf', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["hiPpNPh-Q0yVcBvNv9YH9Q"], "expires_at": "2020-12-05T14:24:01.000000Z", "issued_at": "2020-12-05T13:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.064 40 INFO tempest.lib.common.rest_client [req-2e25c96f-ef38-4879-a416-6c639511eb75 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-05 13:24:01.064 40 DEBUG tempest.lib.common.rest_client [req-2e25c96f-ef38-4879-a416-6c639511eb75 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2e25c96f-ef38-4879-a416-6c639511eb75', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.065 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:24:01.065 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:01.092 38 INFO tempest.lib.common.rest_client [req-555fea96-1d77-444f-b247-9a5d43b12a45 ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.032s 2020-12-05 13:24:01.092 38 DEBUG tempest.lib.common.rest_client [req-555fea96-1d77-444f-b247-9a5d43b12a45 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-555fea96-1d77-444f-b247-9a5d43b12a45', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["MAvqWVqcTECzD8VMUR7-OA"], "expires_at": "2020-12-05T14:24:01.000000Z", "issued_at": "2020-12-05T13:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.114 40 INFO tempest.lib.common.rest_client [req-cfba5a84-3b03-42b8-b7cf-f7b1f29a1902 ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles 0.047s 2020-12-05 13:24:01.114 40 DEBUG tempest.lib.common.rest_client [req-cfba5a84-3b03-42b8-b7cf-f7b1f29a1902 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfba5a84-3b03-42b8-b7cf-f7b1f29a1902', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.138 38 INFO tempest.lib.common.rest_client [req-7af0f6d2-ded5-491f-b649-e69751628ced ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.044s 2020-12-05 13:24:01.138 38 DEBUG tempest.lib.common.rest_client [req-7af0f6d2-ded5-491f-b649-e69751628ced ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7af0f6d2-ded5-491f-b649-e69751628ced', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.167 40 INFO tempest.lib.common.rest_client [req-b9ef2854-9d79-472d-ba87-3539505c4dfb ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles/72a4576c553448cd941b052c1ca0cf2d 0.052s 2020-12-05 13:24:01.168 40 DEBUG tempest.lib.common.rest_client [req-b9ef2854-9d79-472d-ba87-3539505c4dfb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b9ef2854-9d79-472d-ba87-3539505c4dfb', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.180 38 INFO tempest.lib.common.rest_client [req-f31d2809-1083-462b-988e-b2c9d1caed06 ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.041s 2020-12-05 13:24:01.181 38 DEBUG tempest.lib.common.rest_client [req-f31d2809-1083-462b-988e-b2c9d1caed06 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f31d2809-1083-462b-988e-b2c9d1caed06', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.181 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:24:01.181 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:01.217 41 INFO tempest.lib.common.rest_client [req-38dbb2c3-c8e2-4026-8897-47acc6a2ec91 ] Request (MigrationsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=dfa98bc8ca6c489ab28d6371c4af05c3&name=default 0.320s 2020-12-05 13:24:01.218 41 DEBUG tempest.lib.common.rest_client [req-38dbb2c3-c8e2-4026-8897-47acc6a2ec91 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-38dbb2c3-c8e2-4026-8897-47acc6a2ec91', 'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=dfa98bc8ca6c489ab28d6371c4af05c3&name=default'} Body: b'{"security_groups": [{"id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "name": "default", "stateful": true, "tenant_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "description": "Default security group", "security_group_rules": [{"id": "46830afd-f0ea-4848-bd93-c20df10b3bd0", "tenant_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "security_group_id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "description": null, "tags": [], "created_at": "2020-12-05T13:24:01Z", "updated_at": "2020-12-05T13:24:01Z", "revision_number": 0, "project_id": "dfa98bc8ca6c489ab28d6371c4af05c3"}, {"id": "504bf680-4e36-4b4c-a255-ad06d4061f39", "tenant_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "security_group_id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:01Z", "updated_at": "2020-12-05T13:24:01Z", "revision_number": 0, "project_id": "dfa98bc8ca6c489ab28d6371c4af05c3"}, {"id": "963b62f3-9547-4dde-8c0f-04e86eef12c9", "tenant_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "security_group_id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:01Z", "updated_at": "2020-12-05T13:24:01Z", "revision_number": 0, "project_id": "dfa98bc8ca6c489ab28d6371c4af05c3"}, {"id": "e193496c-b78d-4ee2-9ac2-2aaeda8c21c5", "tenant_id": "dfa98bc8ca6c489ab28d6371c4af05c3", "security_group_id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "56ad668c-4fd9-4d62-84c9-83de91e3cf7c", "description": null, "tags": [], "created_at": "2020-12-05T13:24:01Z", "updated_at": "2020-12-05T13:24:01Z", "revision_number": 0, "project_id": "dfa98bc8ca6c489ab28d6371c4af05c3"}], "tags": [], "created_at": "2020-12-05T13:24:01Z", "updated_at": "2020-12-05T13:24:01Z", "revision_number": 1, "project_id": "dfa98bc8ca6c489ab28d6371c4af05c3"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.259 40 INFO tempest.lib.common.rest_client [req-42973e29-77fa-4b56-b640-0a0d731a175d ] Request (HypervisorMaxv252RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles/a629c95d64b3416fb80ae90af4f69c05 0.091s 2020-12-05 13:24:01.260 40 DEBUG tempest.lib.common.rest_client [req-42973e29-77fa-4b56-b640-0a0d731a175d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-42973e29-77fa-4b56-b640-0a0d731a175d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.279 38 INFO tempest.lib.common.rest_client [req-904dd573-e28b-44d9-ab03-3039d2899c8c ] Request (QuotaSetsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.097s 2020-12-05 13:24:01.280 38 DEBUG tempest.lib.common.rest_client [req-904dd573-e28b-44d9-ab03-3039d2899c8c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-904dd573-e28b-44d9-ab03-3039d2899c8c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.371 41 INFO tempest.lib.common.rest_client [req-f5dc3592-cebf-4b1e-9a1a-5dba99b3d97f ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/56ad668c-4fd9-4d62-84c9-83de91e3cf7c 0.152s 2020-12-05 13:24:01.371 41 DEBUG tempest.lib.common.rest_client [req-f5dc3592-cebf-4b1e-9a1a-5dba99b3d97f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-f5dc3592-cebf-4b1e-9a1a-5dba99b3d97f', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/56ad668c-4fd9-4d62-84c9-83de91e3cf7c'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.385 38 INFO tempest.lib.common.rest_client [req-a9c4ca54-55c2-42bf-9226-5636d954cd17 ] Request (QuotaSetsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles/72a4576c553448cd941b052c1ca0cf2d 0.103s 2020-12-05 13:24:01.385 38 DEBUG tempest.lib.common.rest_client [req-a9c4ca54-55c2-42bf-9226-5636d954cd17 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a9c4ca54-55c2-42bf-9226-5636d954cd17', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.498 38 INFO tempest.lib.common.rest_client [req-80fb6d1c-5133-4858-b106-b5c8f0c58e36 ] Request (QuotaSetsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles/a629c95d64b3416fb80ae90af4f69c05 0.112s 2020-12-05 13:24:01.499 38 DEBUG tempest.lib.common.rest_client [req-80fb6d1c-5133-4858-b106-b5c8f0c58e36 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-80fb6d1c-5133-4858-b106-b5c8f0c58e36', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.551 41 INFO tempest.lib.common.rest_client [req-ac344dc7-ac4c-4175-be2a-c1d7eb2bead7 ] Request (MigrationsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3 0.178s 2020-12-05 13:24:01.551 41 DEBUG tempest.lib.common.rest_client [req-ac344dc7-ac4c-4175-be2a-c1d7eb2bead7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ac344dc7-ac4c-4175-be2a-c1d7eb2bead7', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/dfa98bc8ca6c489ab28d6371c4af05c3'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.636 41 INFO tempest.lib.common.rest_client [req-568bcdc6-d4d2-4744-a2bf-9244d16a984d ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-12-05 13:24:01.636 41 DEBUG tempest.lib.common.rest_client [req-568bcdc6-d4d2-4744-a2bf-9244d16a984d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-568bcdc6-d4d2-4744-a2bf-9244d16a984d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["9C2LOVH1Rw2hhBPdROJ4gQ"], "expires_at": "2020-12-05T14:24:01.000000Z", "issued_at": "2020-12-05T13:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.686 41 INFO tempest.lib.common.rest_client [req-3c30577f-64de-4069-8360-4993718dd143 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:24:01.686 41 DEBUG tempest.lib.common.rest_client [req-3c30577f-64de-4069-8360-4993718dd143 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c30577f-64de-4069-8360-4993718dd143', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["2mTVqTTXRgamnLKzGzG4bA"], "expires_at": "2020-12-05T14:24:01.000000Z", "issued_at": "2020-12-05T13:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.736 41 INFO tempest.lib.common.rest_client [req-282afed4-f0ff-4d58-a49e-e2f972ea29ad ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.048s 2020-12-05 13:24:01.736 41 DEBUG tempest.lib.common.rest_client [req-282afed4-f0ff-4d58-a49e-e2f972ea29ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-282afed4-f0ff-4d58-a49e-e2f972ea29ad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.816 41 INFO tempest.lib.common.rest_client [req-a2b030df-14d8-40ea-b248-db8771894875 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.078s 2020-12-05 13:24:01.816 41 DEBUG tempest.lib.common.rest_client [req-a2b030df-14d8-40ea-b248-db8771894875 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecurtiyGroupsRbacTest-95556492-desc", "domain_id": "default", "name": "tempest-SecurtiyGroupsRbacTest-95556492"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a2b030df-14d8-40ea-b248-db8771894875', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "78fa27f34ea04b44bffd3aabe065dfa7", "name": "tempest-SecurtiyGroupsRbacTest-95556492", "domain_id": "default", "description": "tempest-SecurtiyGroupsRbacTest-95556492-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.898 39 INFO tempest.lib.common.rest_client [req-aec259e2-5cf8-4a13-be49-30666571670b ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:24:01.899 39 DEBUG tempest.lib.common.rest_client [req-aec259e2-5cf8-4a13-be49-30666571670b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aec259e2-5cf8-4a13-be49-30666571670b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "password_expires_at": null}, "audit_ids": ["wJmjAxLgQXWiX2eGevDckg"], "expires_at": "2020-12-05T14:24:01.000000Z", "issued_at": "2020-12-05T13:24:01.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.912 41 INFO tempest.lib.common.rest_client [req-130ff08e-979b-4235-af87-7ee7972da1f9 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.095s 2020-12-05 13:24:01.913 41 DEBUG tempest.lib.common.rest_client [req-130ff08e-979b-4235-af87-7ee7972da1f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecurtiyGroupsRbacTest-95556492", "password": "G6#piJ7a*rn=jd3", "project_id": "78fa27f34ea04b44bffd3aabe065dfa7", "email": "tempest-SecurtiyGroupsRbacTest-946149340@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '397', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-130ff08e-979b-4235-af87-7ee7972da1f9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "78fa27f34ea04b44bffd3aabe065dfa7", "email": "tempest-SecurtiyGroupsRbacTest-946149340@example.com", "id": "df7e010d09144cbc959e54f10790c733", "name": "tempest-SecurtiyGroupsRbacTest-95556492", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/df7e010d09144cbc959e54f10790c733"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:01.970 41 INFO tempest.lib.common.rest_client [req-13dd9b50-68f2-4c37-8c6b-af113e0731be ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.056s 2020-12-05 13:24:01.970 41 DEBUG tempest.lib.common.rest_client [req-13dd9b50-68f2-4c37-8c6b-af113e0731be ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-13dd9b50-68f2-4c37-8c6b-af113e0731be', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.021 41 INFO tempest.lib.common.rest_client [req-421f8e2c-1928-4f8e-9aae-968c607fc905 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.050s 2020-12-05 13:24:02.022 41 DEBUG tempest.lib.common.rest_client [req-421f8e2c-1928-4f8e-9aae-968c607fc905 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-421f8e2c-1928-4f8e-9aae-968c607fc905', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.054 39 INFO tempest.lib.common.rest_client [req-358cc123-03dc-4730-8097-032606fcfb73 ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.153s 2020-12-05 13:24:02.055 39 DEBUG tempest.lib.common.rest_client [req-358cc123-03dc-4730-8097-032606fcfb73 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:01 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-358cc123-03dc-4730-8097-032606fcfb73', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.093 41 INFO tempest.lib.common.rest_client [req-374cea73-2229-4d4f-b31f-ee544cc1a56d ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles/72a4576c553448cd941b052c1ca0cf2d 0.071s 2020-12-05 13:24:02.094 41 DEBUG tempest.lib.common.rest_client [req-374cea73-2229-4d4f-b31f-ee544cc1a56d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-374cea73-2229-4d4f-b31f-ee544cc1a56d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.094 41 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurtiyGroupsRbacTest-95556492', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'project_name': 'tempest-SecurtiyGroupsRbacTest-95556492', 'tenant_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'tenant_name': 'tempest-SecurtiyGroupsRbacTest-95556492', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'df7e010d09144cbc959e54f10790c733'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:02.121 39 INFO tempest.lib.common.rest_client [req-0a8cd333-b170-4960-b098-a7cf44cde1a6 ] Request (QuotaClassesRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.064s 2020-12-05 13:24:02.121 39 DEBUG tempest.lib.common.rest_client [req-0a8cd333-b170-4960-b098-a7cf44cde1a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaClassesRbacTest-1494409836-desc", "domain_id": "default", "name": "tempest-QuotaClassesRbacTest-1494409836"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '378', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0a8cd333-b170-4960-b098-a7cf44cde1a6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "cee859ad1de14de293e462f84975b54e", "name": "tempest-QuotaClassesRbacTest-1494409836", "domain_id": "default", "description": "tempest-QuotaClassesRbacTest-1494409836-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/cee859ad1de14de293e462f84975b54e"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.184 41 INFO tempest.lib.common.rest_client [req-1eec8334-6336-449d-8a98-90efee8734b5 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.089s 2020-12-05 13:24:02.185 41 DEBUG tempest.lib.common.rest_client [req-1eec8334-6336-449d-8a98-90efee8734b5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1eec8334-6336-449d-8a98-90efee8734b5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["GotMj3v6SNeHL3HpuBab4A"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.219 39 INFO tempest.lib.common.rest_client [req-e5f86fd6-4839-45bf-8370-51d7f3b09ddc ] Request (QuotaClassesRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.096s 2020-12-05 13:24:02.219 39 DEBUG tempest.lib.common.rest_client [req-e5f86fd6-4839-45bf-8370-51d7f3b09ddc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e5f86fd6-4839-45bf-8370-51d7f3b09ddc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.220 39 DEBUG oslo_concurrency.lockutils [-] Acquired lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:266 2020-12-05 13:24:02.221 39 DEBUG oslo_concurrency.lockutils [-] Acquired external semaphore "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:272 2020-12-05 13:24:02.222 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:02.223 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.223 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.224 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.225 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.226 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.226 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.227 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.228 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.229 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.229 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.230 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.230 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.231 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.231 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.232 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.232 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.233 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.233 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.233 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.234 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.234 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.234 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.234 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.235 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.235 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.235 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.236 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.236 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.236 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.236 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.237 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.237 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.237 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.238 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.238 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.238 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.238 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.239 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.239 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.239 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.240 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.240 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.240 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.240 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.241 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.241 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.241 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.242 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.242 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.242 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.242 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.243 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.243 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.243 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.244 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.244 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.244 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.245 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.245 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.246 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.247 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.247 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.247 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.248 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.249 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.249 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.249 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.250 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.251 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-class-sets:show, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:02.251 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:02.307 39 INFO tempest.lib.common.rest_client [req-abcc47be-7cdc-4a2a-a723-e032f6f33ba8 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles 0.056s 2020-12-05 13:24:02.308 39 DEBUG tempest.lib.common.rest_client [req-abcc47be-7cdc-4a2a-a723-e032f6f33ba8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abcc47be-7cdc-4a2a-a723-e032f6f33ba8', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.351 40 INFO tempest.lib.common.rest_client [req-8f78e43e-7280-4f92-a1ed-8ae7e2cd0d5e ] Request (HypervisorMaxv252RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:24:02.352 40 DEBUG tempest.lib.common.rest_client [req-8f78e43e-7280-4f92-a1ed-8ae7e2cd0d5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8f78e43e-7280-4f92-a1ed-8ae7e2cd0d5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password_expires_at": null}, "audit_ids": ["4wEfy1ApShKRh8MiIX68hw"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.402 39 INFO tempest.lib.common.rest_client [req-9f2d181a-44b8-41b6-a354-0029b3d1de42 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-05 13:24:02.403 39 DEBUG tempest.lib.common.rest_client [req-9f2d181a-44b8-41b6-a354-0029b3d1de42 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9f2d181a-44b8-41b6-a354-0029b3d1de42', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "password_expires_at": null}, "audit_ids": ["qu2I-s7CSdCuWMVmMLXpEA"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.556 40 INFO tempest.lib.common.rest_client [req-a2247404-85e4-4503-b537-0c08e3e5c18d ] Request (HypervisorMaxv252RbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors 0.202s 2020-12-05 13:24:02.556 40 DEBUG tempest.lib.common.rest_client [req-a2247404-85e4-4503-b537-0c08e3e5c18d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '187', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-a2247404-85e4-4503-b537-0c08e3e5c18d', 'x-compute-request-id': 'req-a2247404-85e4-4503-b537-0c08e3e5c18d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}, {"id": 2, "hypervisor_hostname": "lf-virtual8", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.560 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:02.561 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.562 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.563 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.564 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.564 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.564 39 INFO tempest.lib.common.rest_client [req-f3acf7f0-43f7-457d-8c11-d41b8877b0e1 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/default 0.159s 2020-12-05 13:24:02.565 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.565 39 DEBUG tempest.lib.common.rest_client [req-f3acf7f0-43f7-457d-8c11-d41b8877b0e1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '303', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-f3acf7f0-43f7-457d-8c11-d41b8877b0e1', 'x-compute-request-id': 'req-f3acf7f0-43f7-457d-8c11-d41b8877b0e1', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/default'} Body: b'{"quota_class_set": {"id": "default", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.565 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.565 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.566 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.566 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.567 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.567 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.567 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.568 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.568 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.569 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.569 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.569 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.570 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:02.570 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.571 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.571 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.571 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.572 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.573 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.573 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.573 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.574 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.575 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.576 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.577 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.577 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.577 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.578 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.579 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.580 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.581 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.582 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.582 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.582 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.583 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.584 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.585 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.586 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:servers, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:02.587 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:02.591 38 INFO tempest.lib.common.rest_client [req-46caed3a-e6f1-454f-a76a-1eb2b552bdee ] Request (QuotaSetsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:24:02.592 38 DEBUG tempest.lib.common.rest_client [req-46caed3a-e6f1-454f-a76a-1eb2b552bdee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46caed3a-e6f1-454f-a76a-1eb2b552bdee', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["ObNdUZYXQiqZdB5JfknT1Q"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.594 38 WARNING tempest.lib.common.rest_client [-] Deprecated: "tenant_id" property is deprecated for removal, use "project_id" instead 2020-12-05 13:24:02.597 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:02.598 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.598 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.599 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.599 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.599 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.600 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.600 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.601 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.601 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.601 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.602 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.602 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.602 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.602 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.603 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.603 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.603 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.604 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.604 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.604 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.605 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.605 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.606 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.606 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.606 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.606 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.607 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.607 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.607 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.608 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.608 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.608 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.608 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.609 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.609 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.609 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.610 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.610 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.610 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.611 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.611 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.611 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.611 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.612 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.612 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.612 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.613 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.613 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.613 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.614 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.615 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.616 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.616 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.616 39 INFO tempest.lib.common.rest_client [req-aeee7763-0b57-4414-af10-9e8b1fe767c0 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles 0.045s 2020-12-05 13:24:02.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.617 39 DEBUG tempest.lib.common.rest_client [req-aeee7763-0b57-4414-af10-9e8b1fe767c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-aeee7763-0b57-4414-af10-9e8b1fe767c0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.617 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.618 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.619 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.620 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.620 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.620 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.620 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.621 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.622 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.622 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.622 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.623 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.624 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:delete, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:02.648 39 INFO tempest.lib.common.rest_client [req-ee07efba-cbef-4b4f-84f2-097d2664ccc1 ] Request (QuotaClassesRbacTest:test_show_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:24:02.649 39 DEBUG tempest.lib.common.rest_client [req-ee07efba-cbef-4b4f-84f2-097d2664ccc1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ee07efba-cbef-4b4f-84f2-097d2664ccc1', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "password_expires_at": null}, "audit_ids": ["n8pkvpujTN6VhiBdaOqahA"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.650 39 DEBUG oslo_concurrency.lockutils [-] Releasing lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:282 2020-12-05 13:24:02.650 40 INFO tempest.lib.common.rest_client [req-a5492901-2e97-4708-8951-a7f94baf570e ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles 0.063s 2020-12-05 13:24:02.651 40 DEBUG tempest.lib.common.rest_client [req-a5492901-2e97-4708-8951-a7f94baf570e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5492901-2e97-4708-8951-a7f94baf570e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.653 39 DEBUG oslo_concurrency.lockutils [-] Acquired lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:266 2020-12-05 13:24:02.654 39 DEBUG oslo_concurrency.lockutils [-] Acquired external semaphore "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:272 2020-12-05 13:24:02.655 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:02.656 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.656 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.657 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.658 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.658 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.659 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.660 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.660 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.661 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.661 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.661 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.662 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.663 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.664 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.664 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.664 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.665 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.665 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.665 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.665 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.666 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.666 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.666 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.667 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.667 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.667 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.667 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.668 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.668 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.668 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.669 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.669 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.669 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.669 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.670 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.670 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.670 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.671 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.671 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.671 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.671 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.672 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.672 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.672 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.673 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.674 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.675 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.676 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.677 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.678 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.679 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.680 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:02.681 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-class-sets:update, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:02.689 40 INFO tempest.lib.common.rest_client [req-c5c7a4c6-25f5-437f-a978-b4ea91e30c62 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:24:02.690 40 DEBUG tempest.lib.common.rest_client [req-c5c7a4c6-25f5-437f-a978-b4ea91e30c62 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c5c7a4c6-25f5-437f-a978-b4ea91e30c62', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password_expires_at": null}, "audit_ids": ["u3Xg_R9dQGyC6mO3axNfkA"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.744 38 INFO tempest.lib.common.rest_client [req-deed6901-9d96-4f72-a3cf-4202cfd3ee12 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.120s 2020-12-05 13:24:02.745 38 DEBUG tempest.lib.common.rest_client [req-deed6901-9d96-4f72-a3cf-4202cfd3ee12 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-deed6901-9d96-4f72-a3cf-4202cfd3ee12', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.779 39 INFO tempest.lib.common.rest_client [req-18a9b3b4-d80e-4a0b-8817-a2ef078b1246 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-class-sets/cee859ad1de14de293e462f84975b54e 0.097s 2020-12-05 13:24:02.779 39 DEBUG tempest.lib.common.rest_client [req-18a9b3b4-d80e-4a0b-8817-a2ef078b1246 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '328', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-18a9b3b4-d80e-4a0b-8817-a2ef078b1246', 'x-compute-request-id': 'req-18a9b3b4-d80e-4a0b-8817-a2ef078b1246', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/cee859ad1de14de293e462f84975b54e'} Body: b'{"quota_class_set": {"id": "cee859ad1de14de293e462f84975b54e", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.784 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:02.805 38 INFO tempest.lib.common.rest_client [req-7f0517e8-5395-4b88-8959-09bbdf37e1d4 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/projects 0.058s 2020-12-05 13:24:02.805 38 DEBUG tempest.lib.common.rest_client [req-7f0517e8-5395-4b88-8959-09bbdf37e1d4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-QuotaSetsRbacTest-1117204758-desc", "domain_id": "default", "name": "tempest-QuotaSetsRbacTest-1117204758"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '372', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7f0517e8-5395-4b88-8959-09bbdf37e1d4', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "e9c65faeae654a67b6fab4ec2c3fed0e", "name": "tempest-QuotaSetsRbacTest-1117204758", "domain_id": "default", "description": "tempest-QuotaSetsRbacTest-1117204758-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/e9c65faeae654a67b6fab4ec2c3fed0e"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.830 39 INFO tempest.lib.common.rest_client [req-f541c996-fde6-4ccc-ba93-4daf34fae5bc ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles 0.045s 2020-12-05 13:24:02.830 39 DEBUG tempest.lib.common.rest_client [req-f541c996-fde6-4ccc-ba93-4daf34fae5bc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f541c996-fde6-4ccc-ba93-4daf34fae5bc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.831 40 INFO tempest.lib.common.rest_client [req-ac7af593-8979-4bf4-8b3d-b856d5ef7212 ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/servers 0.140s 2020-12-05 13:24:02.832 40 DEBUG tempest.lib.common.rest_client [req-ac7af593-8979-4bf4-8b3d-b856d5ef7212 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '194', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-ac7af593-8979-4bf4-8b3d-b856d5ef7212', 'x-compute-request-id': 'req-ac7af593-8979-4bf4-8b3d-b856d5ef7212', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/servers'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled", "servers": [{"name": "instance-0000a3ea", "uuid": "781deef8-04d6-49a3-9628-c0ececc41b21"}]}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.836 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:02.861 41 INFO tempest.lib.common.rest_client [req-8faaaa26-cde9-49b9-9e7e-edab85157933 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/networks 0.675s 2020-12-05 13:24:02.861 41 DEBUG tempest.lib.common.rest_client [req-8faaaa26-cde9-49b9-9e7e-edab85157933 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"network": {"name": "tempest-SecurtiyGroupsRbacTest-821721193-network", "tenant_id": "78fa27f34ea04b44bffd3aabe065dfa7"}} Response - Headers: {'content-type': 'application/json', 'content-length': '736', 'x-openstack-request-id': 'req-8faaaa26-cde9-49b9-9e7e-edab85157933', 'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/networks'} Body: b'{"network":{"id":"5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3","name":"tempest-SecurtiyGroupsRbacTest-821721193-network","tenant_id":"78fa27f34ea04b44bffd3aabe065dfa7","admin_state_up":true,"mtu":1400,"status":"ACTIVE","subnets":[],"shared":false,"project_id":"78fa27f34ea04b44bffd3aabe065dfa7","port_security_enabled":true,"qos_policy_id":null,"dns_domain":"","router:external":false,"provider:network_type":"vxlan","provider:physical_network":null,"provider:segmentation_id":6,"availability_zone_hints":[],"is_default":false,"availability_zones":[],"ipv4_address_scope":null,"ipv6_address_scope":null,"description":"","l2_adjacency":true,"tags":[],"created_at":"2020-12-05T13:24:02Z","updated_at":"2020-12-05T13:24:02Z","revision_number":1}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.898 39 INFO tempest.lib.common.rest_client [req-b5738bfc-70f3-48a5-8e34-dd86b946c10a ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.067s 2020-12-05 13:24:02.899 39 DEBUG tempest.lib.common.rest_client [req-b5738bfc-70f3-48a5-8e34-dd86b946c10a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b5738bfc-70f3-48a5-8e34-dd86b946c10a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "password_expires_at": null}, "audit_ids": ["hJWeHVa2S060vg2UleQmDA"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.918 38 INFO tempest.lib.common.rest_client [req-a45b3337-0fe9-4341-a979-4aa77e84c3f9 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.112s 2020-12-05 13:24:02.919 38 DEBUG tempest.lib.common.rest_client [req-a45b3337-0fe9-4341-a979-4aa77e84c3f9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a45b3337-0fe9-4341-a979-4aa77e84c3f9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.919 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:02.939 40 INFO tempest.lib.common.rest_client [req-90037e27-afcb-43fb-ba87-561f4f292c2b ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles 0.101s 2020-12-05 13:24:02.940 40 DEBUG tempest.lib.common.rest_client [req-90037e27-afcb-43fb-ba87-561f4f292c2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90037e27-afcb-43fb-ba87-561f4f292c2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:02.979 38 INFO tempest.lib.common.rest_client [req-e6c8a5f3-0773-4f5a-ad89-9c4bfe877f58 ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.058s 2020-12-05 13:24:02.979 38 DEBUG tempest.lib.common.rest_client [req-e6c8a5f3-0773-4f5a-ad89-9c4bfe877f58 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6c8a5f3-0773-4f5a-ad89-9c4bfe877f58', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.019 40 INFO tempest.lib.common.rest_client [req-6068c261-a1c1-4bdd-8e79-cd33923cd74e ] Request (HypervisorMaxv252RbacTest:test_list_servers_on_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:24:03.019 40 DEBUG tempest.lib.common.rest_client [req-6068c261-a1c1-4bdd-8e79-cd33923cd74e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6068c261-a1c1-4bdd-8e79-cd33923cd74e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password_expires_at": null}, "audit_ids": ["BPr7_SXdT1ScE9cidaatbA"], "expires_at": "2020-12-05T14:24:02.000000Z", "issued_at": "2020-12-05T13:24:02.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.023 40 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:03.024 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.025 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.025 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.025 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.026 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.026 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.027 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.027 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.028 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.028 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.029 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.029 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.029 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.030 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.030 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.030 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.031 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.031 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.031 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.032 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.032 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.033 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.033 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.033 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.034 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.034 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.034 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.034 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.035 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.035 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.035 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.035 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.036 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.036 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.036 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.036 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.037 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.037 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.037 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.038 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.038 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.038 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.038 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.039 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.040 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.041 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.042 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.043 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.043 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.044 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.044 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.045 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.045 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.045 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.046 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.047 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.048 40 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.049 40 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-hypervisors:search, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:03.050 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:03.066 38 INFO tempest.lib.common.rest_client [req-7995afbb-6ef2-4047-8f7b-5f9976c32a5e ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.085s 2020-12-05 13:24:03.066 38 DEBUG tempest.lib.common.rest_client [req-7995afbb-6ef2-4047-8f7b-5f9976c32a5e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7995afbb-6ef2-4047-8f7b-5f9976c32a5e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["ABq9nIFUTSawXtngH4hvoA"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.098 40 INFO tempest.lib.common.rest_client [req-ab1f697b-484f-452f-8a6a-bfb8661ad0fe ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles 0.048s 2020-12-05 13:24:03.099 40 DEBUG tempest.lib.common.rest_client [req-ab1f697b-484f-452f-8a6a-bfb8661ad0fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ab1f697b-484f-452f-8a6a-bfb8661ad0fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.133 40 INFO tempest.lib.common.rest_client [req-bf44f74f-6032-457d-8cce-638fe3c319fe ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:24:03.134 40 DEBUG tempest.lib.common.rest_client [req-bf44f74f-6032-457d-8cce-638fe3c319fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-bf44f74f-6032-457d-8cce-638fe3c319fe', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password_expires_at": null}, "audit_ids": ["3rAyAMhuTFCTR84iXo0hlQ"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.164 38 INFO tempest.lib.common.rest_client [req-53eee92c-b514-45c4-989b-846f5f725c0c ] Request (QuotaSetsRbacTest:test_delete_quota_set): 202 DELETE http://172.30.13.94/compute/v2.1/os-quota-sets/e9c65faeae654a67b6fab4ec2c3fed0e 0.096s 2020-12-05 13:24:03.164 38 DEBUG tempest.lib.common.rest_client [req-53eee92c-b514-45c4-989b-846f5f725c0c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '0', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-53eee92c-b514-45c4-989b-846f5f725c0c', 'x-compute-request-id': 'req-53eee92c-b514-45c4-989b-846f5f725c0c', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/e9c65faeae654a67b6fab4ec2c3fed0e'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.165 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:03.216 38 INFO tempest.lib.common.rest_client [req-c4ad8cbd-6242-4432-8ef0-50e99191cf5a ] Request (QuotaSetsRbacTest:test_delete_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.050s 2020-12-05 13:24:03.216 38 DEBUG tempest.lib.common.rest_client [req-c4ad8cbd-6242-4432-8ef0-50e99191cf5a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c4ad8cbd-6242-4432-8ef0-50e99191cf5a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.232 39 INFO tempest.lib.common.rest_client [req-8d689942-09d9-485d-99cc-4609ae616e97 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-class-sets/cee859ad1de14de293e462f84975b54e 0.332s 2020-12-05 13:24:03.233 39 DEBUG tempest.lib.common.rest_client [req-8d689942-09d9-485d-99cc-4609ae616e97 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_class_set": {"cores": 120, "fixed_ips": 99, "floating_ips": 99, "injected_file_content_bytes": 10340, "injected_file_path_bytes": 355, "injected_files": 105, "instances": 110, "key_pairs": 200, "metadata_items": 228, "ram": 51300, "security_group_rules": 99, "security_groups": 99}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:02 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '290', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-8d689942-09d9-485d-99cc-4609ae616e97', 'x-compute-request-id': 'req-8d689942-09d9-485d-99cc-4609ae616e97', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-class-sets/cee859ad1de14de293e462f84975b54e'} Body: b'{"quota_class_set": {"cores": 120, "fixed_ips": 99, "floating_ips": 99, "injected_file_content_bytes": 10340, "injected_file_path_bytes": 355, "injected_files": 105, "instances": 110, "key_pairs": 200, "metadata_items": 228, "ram": 51300, "security_group_rules": 99, "security_groups": 99}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.238 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:03.243 40 INFO tempest.lib.common.rest_client [req-e3871284-dfea-4daa-9b5b-23f2f3e09b68 ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/search 0.108s 2020-12-05 13:24:03.244 40 DEBUG tempest.lib.common.rest_client [req-e3871284-dfea-4daa-9b5b-23f2f3e09b68 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '102', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-e3871284-dfea-4daa-9b5b-23f2f3e09b68', 'x-compute-request-id': 'req-e3871284-dfea-4daa-9b5b-23f2f3e09b68', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-hypervisors/lf-virtual9/search'} Body: b'{"hypervisors": [{"id": 1, "hypervisor_hostname": "lf-virtual9", "state": "up", "status": "enabled"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.248 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:03.252 38 INFO tempest.lib.common.rest_client [req-5153e4e4-2a47-46f5-a4f1-cbc21abfc1db ] Request (QuotaSetsRbacTest:test_delete_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:24:03.253 38 DEBUG tempest.lib.common.rest_client [req-5153e4e4-2a47-46f5-a4f1-cbc21abfc1db ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5153e4e4-2a47-46f5-a4f1-cbc21abfc1db', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["ALV5-jTdRkiSIb_Dn3bVUA"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.290 39 INFO tempest.lib.common.rest_client [req-1cc81065-ca33-44bd-a51b-1459448492a5 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 200 GET http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles 0.051s 2020-12-05 13:24:03.291 39 DEBUG tempest.lib.common.rest_client [req-1cc81065-ca33-44bd-a51b-1459448492a5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1cc81065-ca33-44bd-a51b-1459448492a5', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707/users/bbcccefcea664d52a8505b3adbc6ff60/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.298 40 INFO tempest.lib.common.rest_client [req-b08f21de-4000-4eaa-893c-ea230e998b8f ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 200 GET http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles 0.050s 2020-12-05 13:24:03.299 40 DEBUG tempest.lib.common.rest_client [req-b08f21de-4000-4eaa-893c-ea230e998b8f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b08f21de-4000-4eaa-893c-ea230e998b8f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d/users/5dbac16d37ec4528b0d0266893326e47/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.362 39 INFO tempest.lib.common.rest_client [req-5d9aea76-df49-4b96-8161-f7b9ab9831b6 ] Request (QuotaClassesRbacTest:test_update_quota_class_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.070s 2020-12-05 13:24:03.363 39 DEBUG tempest.lib.common.rest_client [req-5d9aea76-df49-4b96-8161-f7b9ab9831b6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6630', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-5d9aea76-df49-4b96-8161-f7b9ab9831b6', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bbcccefcea664d52a8505b3adbc6ff60", "name": "tempest-QuotaClassesRbacTest-179201651", "password_expires_at": null}, "audit_ids": ["rLLypMfyT_eMNlkPskx2hg"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "eb6466377aee462f8d6d0407772f3707", "name": "tempest-QuotaClassesRbacTest-179201651"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_eb6466377aee462f8d6d0407772f3707", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interfa _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.364 39 DEBUG oslo_concurrency.lockutils [-] Releasing lock "compute_quotas" lock /usr/lib/python3.8/site-packages/oslo_concurrency/lockutils.py:282 2020-12-05 13:24:03.378 40 INFO tempest.lib.common.rest_client [req-668b1783-9cc1-4a2e-91ea-9fc517dc3dac ] Request (HypervisorMaxv252RbacTest:test_search_hypervisor): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.078s 2020-12-05 13:24:03.379 40 DEBUG tempest.lib.common.rest_client [req-668b1783-9cc1-4a2e-91ea-9fc517dc3dac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6642', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-668b1783-9cc1-4a2e-91ea-9fc517dc3dac', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "5dbac16d37ec4528b0d0266893326e47", "name": "tempest-HypervisorMaxv252RbacTest-1638954229", "password_expires_at": null}, "audit_ids": ["OlpnMIqqRVyPu5D8fTiFlA"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "46a1eb551ec7443e9cacfebfa71b659d", "name": "tempest-HypervisorMaxv252RbacTest-1638954229"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_46a1eb551ec7443e9cacfebfa71b659d", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.380 38 INFO tempest.lib.common.rest_client [req-3f3fa836-225f-4255-9636-911cf5270bf6 ] Request (QuotaSetsRbacTest:_run_cleanups): 204 DELETE http://172.30.13.94/identity/v3/projects/e9c65faeae654a67b6fab4ec2c3fed0e 0.126s 2020-12-05 13:24:03.381 38 DEBUG tempest.lib.common.rest_client [req-3f3fa836-225f-4255-9636-911cf5270bf6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f3fa836-225f-4255-9636-911cf5270bf6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/e9c65faeae654a67b6fab4ec2c3fed0e'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.387 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:03.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.388 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.389 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.390 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.391 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.392 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.393 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.394 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.395 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.396 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.397 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.397 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.397 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.398 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.399 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.400 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.400 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.400 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.400 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.401 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.401 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.402 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.402 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.402 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.403 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.403 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.403 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.403 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.404 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.404 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.404 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.405 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.405 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.405 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.405 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.406 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.406 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.407 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.407 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.407 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.408 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.409 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.409 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.409 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.410 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.410 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.410 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.410 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.411 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:03.411 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:defaults, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:03.411 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:03.518 38 INFO tempest.lib.common.rest_client [req-d96863db-db28-49e6-be89-f562286085b7 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.105s 2020-12-05 13:24:03.518 38 DEBUG tempest.lib.common.rest_client [req-d96863db-db28-49e6-be89-f562286085b7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d96863db-db28-49e6-be89-f562286085b7', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.549 40 INFO tempest.lib.common.rest_client [req-3817c918-4737-4a66-9057-134a7291c4fc ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5dbac16d37ec4528b0d0266893326e47 0.166s 2020-12-05 13:24:03.550 40 DEBUG tempest.lib.common.rest_client [req-3817c918-4737-4a66-9057-134a7291c4fc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3817c918-4737-4a66-9057-134a7291c4fc', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5dbac16d37ec4528b0d0266893326e47'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.567 39 INFO tempest.lib.common.rest_client [req-a7fc5b15-f527-46d0-bd4a-176bfa33431c ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/cee859ad1de14de293e462f84975b54e 0.201s 2020-12-05 13:24:03.568 39 DEBUG tempest.lib.common.rest_client [req-a7fc5b15-f527-46d0-bd4a-176bfa33431c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a7fc5b15-f527-46d0-bd4a-176bfa33431c', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/cee859ad1de14de293e462f84975b54e'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.587 41 INFO tempest.lib.common.rest_client [req-2d63e19a-e44b-45a9-80f0-12720fb93463 ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94:9696/v2.0/subnets 0.724s 2020-12-05 13:24:03.588 41 DEBUG tempest.lib.common.rest_client [req-2d63e19a-e44b-45a9-80f0-12720fb93463 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"subnet": {"network_id": "5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3", "cidr": "192.168.120.0/28", "name": "tempest-SecurtiyGroupsRbacTest-821721193-subnet", "tenant_id": "78fa27f34ea04b44bffd3aabe065dfa7", "enable_dhcp": false, "ip_version": 4}} Response - Headers: {'content-type': 'application/json', 'content-length': '709', 'x-openstack-request-id': 'req-2d63e19a-e44b-45a9-80f0-12720fb93463', 'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94:9696/v2.0/subnets'} Body: b'{"subnet":{"id":"64e83395-83a2-4ad7-881e-949c2f21e323","name":"tempest-SecurtiyGroupsRbacTest-821721193-subnet","tenant_id":"78fa27f34ea04b44bffd3aabe065dfa7","network_id":"5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3","ip_version":4,"subnetpool_id":null,"enable_dhcp":false,"ipv6_ra_mode":null,"ipv6_address_mode":null,"gateway_ip":"192.168.120.1","cidr":"192.168.120.0/28","allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.14"}],"host_routes":[],"dns_nameservers":[],"description":"","service_types":[],"dns_publish_fixed_ip":false,"segment_id":null,"tags":[],"created_at":"2020-12-05T13:24:03Z","updated_at":"2020-12-05T13:24:03Z","revision_number":0,"project_id":"78fa27f34ea04b44bffd3aabe065dfa7"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.588 41 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurtiyGroupsRbacTest-95556492', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'project_name': 'tempest-SecurtiyGroupsRbacTest-95556492', 'tenant_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'tenant_name': 'tempest-SecurtiyGroupsRbacTest-95556492', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'df7e010d09144cbc959e54f10790c733'}, Network: {'id': '5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3', 'name': 'tempest-SecurtiyGroupsRbacTest-821721193-network', 'tenant_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 6, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-05T13:24:02Z', 'updated_at': '2020-12-05T13:24:02Z', 'revision_number': 1}, Subnet: {'id': '64e83395-83a2-4ad7-881e-949c2f21e323', 'name': 'tempest-SecurtiyGroupsRbacTest-821721193-subnet', 'tenant_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'network_id': '5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3', 'ip_version': 4, 'subnetpool_id': None, 'enable_dhcp': False, 'ipv6_ra_mode': None, 'ipv6_address_mode': None, 'gateway_ip': '192.168.120.1', 'cidr': '192.168.120.0/28', 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.14'}], 'host_routes': [], 'dns_nameservers': [], 'description': '', 'service_types': [], 'dns_publish_fixed_ip': False, 'segment_id': None, 'tags': [], 'created_at': '2020-12-05T13:24:03Z', 'updated_at': '2020-12-05T13:24:03Z', 'revision_number': 0, 'project_id': '78fa27f34ea04b44bffd3aabe065dfa7'}, Router: None 2020-12-05 13:24:03.602 38 INFO tempest.lib.common.rest_client [req-045d3b2c-7d74-4bef-9808-675318b5c8ef ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.082s 2020-12-05 13:24:03.603 38 DEBUG tempest.lib.common.rest_client [req-045d3b2c-7d74-4bef-9808-675318b5c8ef ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-045d3b2c-7d74-4bef-9808-675318b5c8ef', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["hPrgIme3SyOg7tJpqyj4Zg"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.630 40 INFO tempest.lib.common.rest_client [req-7a396415-8546-4738-8af8-ca03f4008026 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.079s 2020-12-05 13:24:03.631 40 DEBUG tempest.lib.common.rest_client [req-7a396415-8546-4738-8af8-ca03f4008026 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7a396415-8546-4738-8af8-ca03f4008026', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["0bhKQzURSE25AZf-OjmfEw"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.705 41 INFO tempest.lib.common.rest_client [req-a119bf27-e3ce-4f94-bee5-4e38a3c4e55f ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.108s 2020-12-05 13:24:03.706 41 DEBUG tempest.lib.common.rest_client [req-a119bf27-e3ce-4f94-bee5-4e38a3c4e55f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6571', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a119bf27-e3ce-4f94-bee5-4e38a3c4e55f', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df7e010d09144cbc959e54f10790c733", "name": "tempest-SecurtiyGroupsRbacTest-95556492", "password_expires_at": null}, "audit_ids": ["IzBjnWCdSFW4rPLYknQcfw"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78fa27f34ea04b44bffd3aabe065dfa7", "name": "tempest-SecurtiyGroupsRbacTest-95556492"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.747 41 INFO tempest.lib.common.rest_client [req-14dccbe7-9e20-4345-8e7f-b9f1a33a579c ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.039s 2020-12-05 13:24:03.747 41 DEBUG tempest.lib.common.rest_client [req-14dccbe7-9e20-4345-8e7f-b9f1a33a579c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-14dccbe7-9e20-4345-8e7f-b9f1a33a579c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["TRi8BurITf66Ww4elUjjFA"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.756 39 INFO tempest.lib.common.rest_client [req-f6b5d075-da0d-4657-a64f-7a2e42b3ee59 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bbcccefcea664d52a8505b3adbc6ff60 0.187s 2020-12-05 13:24:03.756 39 DEBUG tempest.lib.common.rest_client [req-f6b5d075-da0d-4657-a64f-7a2e42b3ee59 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f6b5d075-da0d-4657-a64f-7a2e42b3ee59', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bbcccefcea664d52a8505b3adbc6ff60'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.844 39 INFO tempest.lib.common.rest_client [req-8001c83f-3659-423b-afd7-9d24b5c34722 ] Request (QuotaClassesRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:24:03.845 39 DEBUG tempest.lib.common.rest_client [req-8001c83f-3659-423b-afd7-9d24b5c34722 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8001c83f-3659-423b-afd7-9d24b5c34722', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["Z67wzQidSce4LThN0MBKhA"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.950 41 INFO tempest.lib.common.rest_client [req-f3f254be-d68d-48d5-9d81-cde1736a445d ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.192s 2020-12-05 13:24:03.950 41 DEBUG tempest.lib.common.rest_client [req-f3f254be-d68d-48d5-9d81-cde1736a445d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-f3f254be-d68d-48d5-9d81-cde1736a445d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["-4n2h5ooStCNNncaLpCTtQ"], "expires_at": "2020-12-05T14:24:03.000000Z", "issued_at": "2020-12-05T13:24:03.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.970 40 INFO tempest.lib.common.rest_client [req-e89d8a72-0c7c-4a25-8e62-cd1f683a3caa ] Request (HypervisorMaxv252RbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=46a1eb551ec7443e9cacfebfa71b659d&name=default 0.338s 2020-12-05 13:24:03.970 40 DEBUG tempest.lib.common.rest_client [req-e89d8a72-0c7c-4a25-8e62-cd1f683a3caa ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-e89d8a72-0c7c-4a25-8e62-cd1f683a3caa', 'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=46a1eb551ec7443e9cacfebfa71b659d&name=default'} Body: b'{"security_groups": [{"id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "name": "default", "stateful": true, "tenant_id": "46a1eb551ec7443e9cacfebfa71b659d", "description": "Default security group", "security_group_rules": [{"id": "442fbc60-89b3-4ed1-8932-10a840ab46d9", "tenant_id": "46a1eb551ec7443e9cacfebfa71b659d", "security_group_id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "description": null, "tags": [], "created_at": "2020-12-05T13:24:03Z", "updated_at": "2020-12-05T13:24:03Z", "revision_number": 0, "project_id": "46a1eb551ec7443e9cacfebfa71b659d"}, {"id": "58cec2b1-2316-48bf-8267-1478f6a77cec", "tenant_id": "46a1eb551ec7443e9cacfebfa71b659d", "security_group_id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:03Z", "updated_at": "2020-12-05T13:24:03Z", "revision_number": 0, "project_id": "46a1eb551ec7443e9cacfebfa71b659d"}, {"id": "706767a7-cec4-4dee-9057-ea432da76753", "tenant_id": "46a1eb551ec7443e9cacfebfa71b659d", "security_group_id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "description": null, "tags": [], "created_at": "2020-12-05T13:24:03Z", "updated_at": "2020-12-05T13:24:03Z", "revision_number": 0, "project_id": "46a1eb551ec7443e9cacfebfa71b659d"}, {"id": "f6c00e71-85f9-4c7f-9a2e-b65d237885de", "tenant_id": "46a1eb551ec7443e9cacfebfa71b659d", "security_group_id": "b7ab163a-b629-4d14-8fb5-a29f4f4200f4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:03Z", "updated_at": "2020-12-05T13:24:03Z", "revision_number": 0, "project_id": "46a1eb551ec7443e9cacfebfa71b659d"}], "tags": [], "created_at": "2020-12-05T13:24:03Z", "updated_at": "2020-12-05T13:24:03Z", "revision_number": 1, "project_id": "46a1eb551ec7443e9cacfebfa71b659d"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.984 38 INFO tempest.lib.common.rest_client [req-0b6f04e8-0e9d-46fd-9b28-4b6a7305626b ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787/defaults 0.380s 2020-12-05 13:24:03.985 38 DEBUG tempest.lib.common.rest_client [req-0b6f04e8-0e9d-46fd-9b28-4b6a7305626b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0b6f04e8-0e9d-46fd-9b28-4b6a7305626b', 'x-compute-request-id': 'req-0b6f04e8-0e9d-46fd-9b28-4b6a7305626b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787/defaults'} Body: b'{"quota_set": {"id": "1ee7c45edd2f4d50ac53c9ae24068787", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:03.991 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:04.010 41 INFO tempest.lib.common.rest_client [req-cfc3f38f-1d26-49e6-a413-68d58b440799 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.058s 2020-12-05 13:24:04.010 41 DEBUG tempest.lib.common.rest_client [req-cfc3f38f-1d26-49e6-a413-68d58b440799 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cfc3f38f-1d26-49e6-a413-68d58b440799', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.050 38 INFO tempest.lib.common.rest_client [req-793d27fa-f41b-49d2-9d60-c8b86f8794fe ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.058s 2020-12-05 13:24:04.051 38 DEBUG tempest.lib.common.rest_client [req-793d27fa-f41b-49d2-9d60-c8b86f8794fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:03 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-793d27fa-f41b-49d2-9d60-c8b86f8794fe', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.067 41 INFO tempest.lib.common.rest_client [req-3a27367e-99e4-44ee-af87-38e626061737 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.055s 2020-12-05 13:24:04.067 41 DEBUG tempest.lib.common.rest_client [req-3a27367e-99e4-44ee-af87-38e626061737 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3a27367e-99e4-44ee-af87-38e626061737', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.068 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:24:04.068 41 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:04.086 38 INFO tempest.lib.common.rest_client [req-09969ce0-b6d8-4967-b414-acdcc3e2afc8 ] Request (QuotaSetsRbacTest:test_show_default_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.035s 2020-12-05 13:24:04.087 38 DEBUG tempest.lib.common.rest_client [req-09969ce0-b6d8-4967-b414-acdcc3e2afc8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09969ce0-b6d8-4967-b414-acdcc3e2afc8', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["djKBa-8AT66jFNWTEtIRPg"], "expires_at": "2020-12-05T14:24:04.000000Z", "issued_at": "2020-12-05T13:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.092 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:04.093 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.093 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.094 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.094 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.095 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.095 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.096 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.096 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.096 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.097 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.097 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.098 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.098 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.098 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.099 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.099 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.099 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.100 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.100 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.100 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.101 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.102 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.102 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.102 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.103 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.103 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.104 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.104 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.104 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.105 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.106 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.107 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.107 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.107 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.108 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.108 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.108 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.109 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.109 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.109 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.110 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.110 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.110 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.111 40 INFO tempest.lib.common.rest_client [req-2cfcc9bc-d759-4003-a3d3-91352ca1a8a9 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/b7ab163a-b629-4d14-8fb5-a29f4f4200f4 0.139s 2020-12-05 13:24:04.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.111 40 DEBUG tempest.lib.common.rest_client [req-2cfcc9bc-d759-4003-a3d3-91352ca1a8a9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-2cfcc9bc-d759-4003-a3d3-91352ca1a8a9', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/b7ab163a-b629-4d14-8fb5-a29f4f4200f4'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.111 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.112 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.113 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.113 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.113 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.114 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.114 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.115 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.116 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.117 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.118 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.118 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.118 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.119 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.119 41 INFO tempest.lib.common.rest_client [req-fd5f570b-3d7b-471b-8de9-3cd897bc6f52 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles 0.050s 2020-12-05 13:24:04.119 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.119 41 DEBUG tempest.lib.common.rest_client [req-fd5f570b-3d7b-471b-8de9-3cd897bc6f52 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd5f570b-3d7b-471b-8de9-3cd897bc6f52', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.119 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.120 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:show, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:04.121 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:04.146 39 INFO tempest.lib.common.rest_client [req-f2244c87-55ae-4c4f-8054-be0b8d1abdde ] Request (QuotaClassesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=eb6466377aee462f8d6d0407772f3707&name=default 0.300s 2020-12-05 13:24:04.146 39 DEBUG tempest.lib.common.rest_client [req-f2244c87-55ae-4c4f-8054-be0b8d1abdde ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f2244c87-55ae-4c4f-8054-be0b8d1abdde', 'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=eb6466377aee462f8d6d0407772f3707&name=default'} Body: b'{"security_groups": [{"id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "name": "default", "stateful": true, "tenant_id": "eb6466377aee462f8d6d0407772f3707", "description": "Default security group", "security_group_rules": [{"id": "113f025b-38be-48f3-944a-f19932171b44", "tenant_id": "eb6466377aee462f8d6d0407772f3707", "security_group_id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "eb6466377aee462f8d6d0407772f3707"}, {"id": "2e320f60-b7b7-4195-a3ed-460e372eceb2", "tenant_id": "eb6466377aee462f8d6d0407772f3707", "security_group_id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "eb6466377aee462f8d6d0407772f3707"}, {"id": "4e27234d-824e-408c-b890-4d0817897d43", "tenant_id": "eb6466377aee462f8d6d0407772f3707", "security_group_id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "eb6466377aee462f8d6d0407772f3707"}, {"id": "ff5b899d-a3e2-48a4-8f00-d8052182baa8", "tenant_id": "eb6466377aee462f8d6d0407772f3707", "security_group_id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "56852d92-46c0-4032-8c3e-2cf36d77f2b4", "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "eb6466377aee462f8d6d0407772f3707"}], "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 1, "project_id": "eb6466377aee462f8d6d0407772f3707"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.173 38 INFO tempest.lib.common.rest_client [req-2ec9e904-e963-4b60-8c58-a2aca0d65aaf ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.051s 2020-12-05 13:24:04.174 38 DEBUG tempest.lib.common.rest_client [req-2ec9e904-e963-4b60-8c58-a2aca0d65aaf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2ec9e904-e963-4b60-8c58-a2aca0d65aaf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.186 41 INFO tempest.lib.common.rest_client [req-d95a2f44-209e-4493-a094-45e3c9ce95ac ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles/72a4576c553448cd941b052c1ca0cf2d 0.066s 2020-12-05 13:24:04.187 41 DEBUG tempest.lib.common.rest_client [req-d95a2f44-209e-4493-a094-45e3c9ce95ac ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d95a2f44-209e-4493-a094-45e3c9ce95ac', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.253 40 INFO tempest.lib.common.rest_client [req-ed7639f4-6ed2-4860-b32d-9886ee2f54a6 ] Request (HypervisorMaxv252RbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d 0.141s 2020-12-05 13:24:04.254 40 DEBUG tempest.lib.common.rest_client [req-ed7639f4-6ed2-4860-b32d-9886ee2f54a6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed7639f4-6ed2-4860-b32d-9886ee2f54a6', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/46a1eb551ec7443e9cacfebfa71b659d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.278 38 INFO tempest.lib.common.rest_client [req-7b49faf1-7f53-40f6-8134-e411293984f5 ] Request (QuotaSetsRbacTest:test_show_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.103s 2020-12-05 13:24:04.279 38 DEBUG tempest.lib.common.rest_client [req-7b49faf1-7f53-40f6-8134-e411293984f5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-7b49faf1-7f53-40f6-8134-e411293984f5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["ddmoFNJZTduoegTlR1Is0w"], "expires_at": "2020-12-05T14:24:04.000000Z", "issued_at": "2020-12-05T13:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.285 39 INFO tempest.lib.common.rest_client [req-bf446eb0-0d0c-4692-a197-0ab7be118e78 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/56852d92-46c0-4032-8c3e-2cf36d77f2b4 0.137s 2020-12-05 13:24:04.285 39 DEBUG tempest.lib.common.rest_client [req-bf446eb0-0d0c-4692-a197-0ab7be118e78 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-bf446eb0-0d0c-4692-a197-0ab7be118e78', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/56852d92-46c0-4032-8c3e-2cf36d77f2b4'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.290 41 INFO tempest.lib.common.rest_client [req-3c979b4e-265f-4f3c-977b-69750ac70c14 ] Request (SecurtiyGroupsRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles/a629c95d64b3416fb80ae90af4f69c05 0.103s 2020-12-05 13:24:04.291 41 DEBUG tempest.lib.common.rest_client [req-3c979b4e-265f-4f3c-977b-69750ac70c14 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3c979b4e-265f-4f3c-977b-69750ac70c14', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/78fa27f34ea04b44bffd3aabe065dfa7/users/df7e010d09144cbc959e54f10790c733/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.291 40 INFO tempest.lib.common.rest_client [req-b94f3712-a55e-4cce-9616-334497454bbb ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.034s 2020-12-05 13:24:04.292 40 DEBUG tempest.lib.common.rest_client [req-b94f3712-a55e-4cce-9616-334497454bbb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b94f3712-a55e-4cce-9616-334497454bbb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["M-HW_gbsSk66Nfgrr7DeRQ"], "expires_at": "2020-12-05T14:24:04.000000Z", "issued_at": "2020-12-05T13:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.394 40 INFO tempest.lib.common.rest_client [req-6e14f182-ec8d-4d4c-875a-230ae7256b83 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-05 13:24:04.395 40 DEBUG tempest.lib.common.rest_client [req-6e14f182-ec8d-4d4c-875a-230ae7256b83 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6e14f182-ec8d-4d4c-875a-230ae7256b83', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["rM0Wp3NoRFqZ5IamaXK5kA"], "expires_at": "2020-12-05T14:24:04.000000Z", "issued_at": "2020-12-05T13:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.453 40 INFO tempest.lib.common.rest_client [req-76468b55-3a70-46c5-a574-b3e6587a1b35 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.057s 2020-12-05 13:24:04.454 40 DEBUG tempest.lib.common.rest_client [req-76468b55-3a70-46c5-a574-b3e6587a1b35 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-76468b55-3a70-46c5-a574-b3e6587a1b35', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.479 39 INFO tempest.lib.common.rest_client [req-8903f88b-5150-4797-8b63-ef212a9be2a1 ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707 0.193s 2020-12-05 13:24:04.480 39 DEBUG tempest.lib.common.rest_client [req-8903f88b-5150-4797-8b63-ef212a9be2a1 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8903f88b-5150-4797-8b63-ef212a9be2a1', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/eb6466377aee462f8d6d0407772f3707'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.585 40 INFO tempest.lib.common.rest_client [req-620f196f-c9ad-47d9-a893-248d910648f3 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.130s 2020-12-05 13:24:04.585 40 DEBUG tempest.lib.common.rest_client [req-620f196f-c9ad-47d9-a893-248d910648f3 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ImageSizeRbacTest-550674434-desc", "domain_id": "default", "name": "tempest-ImageSizeRbacTest-550674434"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '370', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-620f196f-c9ad-47d9-a893-248d910648f3', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "fc893de3ad4d471e9a8edec65cd8a6f2", "name": "tempest-ImageSizeRbacTest-550674434", "domain_id": "default", "description": "tempest-ImageSizeRbacTest-550674434-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.664 39 INFO tempest.lib.common.rest_client [req-e84c7b09-7a15-4cab-86aa-2f38bcefbf2b ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/7ff013e7ce044123928c1d288c712190 0.183s 2020-12-05 13:24:04.664 39 DEBUG tempest.lib.common.rest_client [req-e84c7b09-7a15-4cab-86aa-2f38bcefbf2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e84c7b09-7a15-4cab-86aa-2f38bcefbf2b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/7ff013e7ce044123928c1d288c712190'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.696 40 INFO tempest.lib.common.rest_client [req-294a5353-a02b-413e-96a3-bcf44f45bac9 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.109s 2020-12-05 13:24:04.696 40 DEBUG tempest.lib.common.rest_client [req-294a5353-a02b-413e-96a3-bcf44f45bac9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ImageSizeRbacTest-550674434", "password": "C1%iuP3!kW_hKnf", "project_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "email": "tempest-ImageSizeRbacTest-799423523@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-294a5353-a02b-413e-96a3-bcf44f45bac9', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "email": "tempest-ImageSizeRbacTest-799423523@example.com", "id": "bb3a51d5850a43be9beaed85009d7a11", "name": "tempest-ImageSizeRbacTest-550674434", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/bb3a51d5850a43be9beaed85009d7a11"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.749 38 INFO tempest.lib.common.rest_client [req-27fe368b-c3c3-4891-9904-dfa2c6555786 ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787 0.467s 2020-12-05 13:24:04.749 38 DEBUG tempest.lib.common.rest_client [req-27fe368b-c3c3-4891-9904-dfa2c6555786 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-27fe368b-c3c3-4891-9904-dfa2c6555786', 'x-compute-request-id': 'req-27fe368b-c3c3-4891-9904-dfa2c6555786', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787'} Body: b'{"quota_set": {"id": "1ee7c45edd2f4d50ac53c9ae24068787", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.754 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:04.796 40 INFO tempest.lib.common.rest_client [req-595fb6db-d94a-4a56-ad1d-4cc1474d9a2b ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.099s 2020-12-05 13:24:04.797 40 DEBUG tempest.lib.common.rest_client [req-595fb6db-d94a-4a56-ad1d-4cc1474d9a2b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-595fb6db-d94a-4a56-ad1d-4cc1474d9a2b', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.852 39 INFO tempest.lib.common.rest_client [req-ff816a1b-8fd7-419d-aab7-516a52761e85 ] Request (QuotaClassesRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4d6646d116e64009af0619299ece3b78&name=default 0.187s 2020-12-05 13:24:04.852 39 DEBUG tempest.lib.common.rest_client [req-ff816a1b-8fd7-419d-aab7-516a52761e85 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-ff816a1b-8fd7-419d-aab7-516a52761e85', 'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=4d6646d116e64009af0619299ece3b78&name=default'} Body: b'{"security_groups": [{"id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "name": "default", "stateful": true, "tenant_id": "4d6646d116e64009af0619299ece3b78", "description": "Default security group", "security_group_rules": [{"id": "a2560ecb-48b6-4e2a-904c-c05081b842bf", "tenant_id": "4d6646d116e64009af0619299ece3b78", "security_group_id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "4d6646d116e64009af0619299ece3b78"}, {"id": "e5815952-0917-483b-9461-9ae67eef083a", "tenant_id": "4d6646d116e64009af0619299ece3b78", "security_group_id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "4d6646d116e64009af0619299ece3b78"}, {"id": "f06a9087-da9f-42c7-beb8-bc110591304f", "tenant_id": "4d6646d116e64009af0619299ece3b78", "security_group_id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "4d6646d116e64009af0619299ece3b78"}, {"id": "fd70d434-53db-4f2c-9c5f-806cf98464f6", "tenant_id": "4d6646d116e64009af0619299ece3b78", "security_group_id": "bb80ead4-ef1c-46e8-a38c-3bb1f977a290", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 0, "project_id": "4d6646d116e64009af0619299ece3b78"}], "tags": [], "created_at": "2020-12-05T13:24:04Z", "updated_at": "2020-12-05T13:24:04Z", "revision_number": 1, "project_id": "4d6646d116e64009af0619299ece3b78"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.864 38 INFO tempest.lib.common.rest_client [req-c220d819-58f4-48ac-a8b0-cd6000947c8a ] Request (QuotaSetsRbacTest:test_show_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.108s 2020-12-05 13:24:04.864 38 DEBUG tempest.lib.common.rest_client [req-c220d819-58f4-48ac-a8b0-cd6000947c8a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c220d819-58f4-48ac-a8b0-cd6000947c8a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.924 40 INFO tempest.lib.common.rest_client [req-a0d0eb2d-4665-4a59-a6b3-d54652acd79c ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.126s 2020-12-05 13:24:04.924 40 DEBUG tempest.lib.common.rest_client [req-a0d0eb2d-4665-4a59-a6b3-d54652acd79c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a0d0eb2d-4665-4a59-a6b3-d54652acd79c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.946 38 INFO tempest.lib.common.rest_client [req-6930b0bd-ad7d-419e-8977-b4cdf3e971ad ] Request (QuotaSetsRbacTest:test_show_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.081s 2020-12-05 13:24:04.947 38 DEBUG tempest.lib.common.rest_client [req-6930b0bd-ad7d-419e-8977-b4cdf3e971ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6930b0bd-ad7d-419e-8977-b4cdf3e971ad', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["sf8V-gNiSaGuAl_tN3bF0g"], "expires_at": "2020-12-05T14:24:04.000000Z", "issued_at": "2020-12-05T13:24:04.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.951 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:04.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.959 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.959 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.959 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.960 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.961 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.961 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.961 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.962 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.962 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.962 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.963 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.964 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.965 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.966 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.966 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.966 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.967 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.968 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.968 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.968 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.969 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.969 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.969 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.969 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.970 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.970 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.970 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.971 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.971 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.972 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.972 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.972 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.972 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.973 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.973 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.973 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.974 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.974 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.974 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.975 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.975 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.975 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.975 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:04.977 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:detail, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:04.977 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:04.985 39 INFO tempest.lib.common.rest_client [req-aea7dfa1-5ea9-4076-9511-6248dd59fdee ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/bb80ead4-ef1c-46e8-a38c-3bb1f977a290 0.132s 2020-12-05 13:24:04.986 39 DEBUG tempest.lib.common.rest_client [req-aea7dfa1-5ea9-4076-9511-6248dd59fdee ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-aea7dfa1-5ea9-4076-9511-6248dd59fdee', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/bb80ead4-ef1c-46e8-a38c-3bb1f977a290'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.993 40 INFO tempest.lib.common.rest_client [req-911a4901-1537-432e-a88c-f2a8b7d7051b ] Request (ImageSizeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles/72a4576c553448cd941b052c1ca0cf2d 0.067s 2020-12-05 13:24:04.993 40 DEBUG tempest.lib.common.rest_client [req-911a4901-1537-432e-a88c-f2a8b7d7051b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-911a4901-1537-432e-a88c-f2a8b7d7051b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:04.993 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageSizeRbacTest-550674434', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fc893de3ad4d471e9a8edec65cd8a6f2', 'project_name': 'tempest-ImageSizeRbacTest-550674434', 'tenant_id': 'fc893de3ad4d471e9a8edec65cd8a6f2', 'tenant_name': 'tempest-ImageSizeRbacTest-550674434', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bb3a51d5850a43be9beaed85009d7a11'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:04.994 40 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ImageSizeRbacTest-550674434', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': 'fc893de3ad4d471e9a8edec65cd8a6f2', 'project_name': 'tempest-ImageSizeRbacTest-550674434', 'tenant_id': 'fc893de3ad4d471e9a8edec65cd8a6f2', 'tenant_name': 'tempest-ImageSizeRbacTest-550674434', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': 'bb3a51d5850a43be9beaed85009d7a11'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:05.079 38 INFO tempest.lib.common.rest_client [req-eaabeccd-3ce2-44c6-b685-8de69838c375 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.102s 2020-12-05 13:24:05.080 38 DEBUG tempest.lib.common.rest_client [req-eaabeccd-3ce2-44c6-b685-8de69838c375 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eaabeccd-3ce2-44c6-b685-8de69838c375', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.107 40 INFO tempest.lib.common.rest_client [req-3ed4f728-084f-43af-91a6-489127e82f6a ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.104s 2020-12-05 13:24:05.107 40 DEBUG tempest.lib.common.rest_client [req-3ed4f728-084f-43af-91a6-489127e82f6a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6563', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3ed4f728-084f-43af-91a6-489127e82f6a', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb3a51d5850a43be9beaed85009d7a11", "name": "tempest-ImageSizeRbacTest-550674434", "password_expires_at": null}, "audit_ids": ["ArtzCzxQTcCfMpHPVprP2w"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fc893de3ad4d471e9a8edec65cd8a6f2", "name": "tempest-ImageSizeRbacTest-550674434"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.9 _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.169 39 INFO tempest.lib.common.rest_client [req-ed32d47d-c753-49ae-86f7-e13e76a4c8ff ] Request (QuotaClassesRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/4d6646d116e64009af0619299ece3b78 0.182s 2020-12-05 13:24:05.170 39 DEBUG tempest.lib.common.rest_client [req-ed32d47d-c753-49ae-86f7-e13e76a4c8ff ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:04 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ed32d47d-c753-49ae-86f7-e13e76a4c8ff', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/4d6646d116e64009af0619299ece3b78'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.181 38 INFO tempest.lib.common.rest_client [req-e96e0a19-c25d-4702-9ca7-a57991e50a9e ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.099s 2020-12-05 13:24:05.181 38 DEBUG tempest.lib.common.rest_client [req-e96e0a19-c25d-4702-9ca7-a57991e50a9e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e96e0a19-c25d-4702-9ca7-a57991e50a9e', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["-5thUGZjS6qkcOQSRrWuaA"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.206 40 INFO tempest.lib.common.rest_client [req-ae6d2d6e-f39e-493a-bebb-db759e3562dd ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.097s 2020-12-05 13:24:05.207 40 DEBUG tempest.lib.common.rest_client [req-ae6d2d6e-f39e-493a-bebb-db759e3562dd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ae6d2d6e-f39e-493a-bebb-db759e3562dd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["6-vOAR5VSjqVmVsBn8S1Nw"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.215 39 INFO tempest.lib.common.rest_client [req-3281d5b6-d528-4851-b2b0-b785eac3a506 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.042s 2020-12-05 13:24:05.216 39 DEBUG tempest.lib.common.rest_client [req-3281d5b6-d528-4851-b2b0-b785eac3a506 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3281d5b6-d528-4851-b2b0-b785eac3a506', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["GnFdlL2_SFGPt9E4GPtKZg"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.257 40 INFO tempest.lib.common.rest_client [req-87d5fa5e-608b-41c4-9fc8-80a2f164ce79 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.040s 2020-12-05 13:24:05.258 40 DEBUG tempest.lib.common.rest_client [req-87d5fa5e-608b-41c4-9fc8-80a2f164ce79 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-87d5fa5e-608b-41c4-9fc8-80a2f164ce79', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["-iOqGQZIQR6WPCGi3mCj8Q"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.260 39 INFO tempest.lib.common.rest_client [req-3e26cf3a-fc7e-4ce8-ab11-4ba70688d8bd ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.037s 2020-12-05 13:24:05.260 39 DEBUG tempest.lib.common.rest_client [req-3e26cf3a-fc7e-4ce8-ab11-4ba70688d8bd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3e26cf3a-fc7e-4ce8-ab11-4ba70688d8bd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["LM7IdzYGSwScq6gKiz021w"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.311 39 INFO tempest.lib.common.rest_client [req-abf3d1e0-844d-4236-a438-3f945155ca9d ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.049s 2020-12-05 13:24:05.311 39 DEBUG tempest.lib.common.rest_client [req-abf3d1e0-844d-4236-a438-3f945155ca9d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-abf3d1e0-844d-4236-a438-3f945155ca9d', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.313 40 INFO tempest.lib.common.rest_client [req-53d5415a-3971-4b83-92da-40f38458b74a ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.054s 2020-12-05 13:24:05.314 40 DEBUG tempest.lib.common.rest_client [req-53d5415a-3971-4b83-92da-40f38458b74a ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-53d5415a-3971-4b83-92da-40f38458b74a', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.360 40 INFO tempest.lib.common.rest_client [req-2b81cb25-56f7-494d-9125-82327a892ea6 ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.045s 2020-12-05 13:24:05.361 40 DEBUG tempest.lib.common.rest_client [req-2b81cb25-56f7-494d-9125-82327a892ea6 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2b81cb25-56f7-494d-9125-82327a892ea6', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.361 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:24:05.362 40 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:05.376 39 INFO tempest.lib.common.rest_client [req-52ce597b-1d5e-4e82-96b8-abb5fd265d82 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.063s 2020-12-05 13:24:05.377 39 DEBUG tempest.lib.common.rest_client [req-52ce597b-1d5e-4e82-96b8-abb5fd265d82 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-SecurityGroupsRbacMaxV235Test-83634119-desc", "domain_id": "default", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '392', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-52ce597b-1d5e-4e82-96b8-abb5fd265d82', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "45083965a56643f4aaff2a805ccfa2a8", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "domain_id": "default", "description": "tempest-SecurityGroupsRbacMaxV235Test-83634119-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.380 41 INFO tempest.lib.common.rest_client [req-46be3e78-ca59-4742-8fa2-9e8eebf41dab ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:24:05.380 41 DEBUG tempest.lib.common.rest_client [req-46be3e78-ca59-4742-8fa2-9e8eebf41dab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-46be3e78-ca59-4742-8fa2-9e8eebf41dab', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df7e010d09144cbc959e54f10790c733", "name": "tempest-SecurtiyGroupsRbacTest-95556492", "password_expires_at": null}, "audit_ids": ["uFy_-YLWT3yRUoWD7nf2VA"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78fa27f34ea04b44bffd3aabe065dfa7", "name": "tempest-SecurtiyGroupsRbacTest-95556492"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.408 40 INFO tempest.lib.common.rest_client [req-0904e18b-f82b-40cb-9468-0983aa3db6cf ] Request (ImageSizeRbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles 0.045s 2020-12-05 13:24:05.408 40 DEBUG tempest.lib.common.rest_client [req-0904e18b-f82b-40cb-9468-0983aa3db6cf ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0904e18b-f82b-40cb-9468-0983aa3db6cf', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.479 41 INFO tempest.lib.common.rest_client [req-48efc1df-092a-4437-af96-4e4bf7668c1c ] Request (SecurtiyGroupsRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:24:05.479 41 DEBUG tempest.lib.common.rest_client [req-48efc1df-092a-4437-af96-4e4bf7668c1c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6632', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-48efc1df-092a-4437-af96-4e4bf7668c1c', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "df7e010d09144cbc959e54f10790c733", "name": "tempest-SecurtiyGroupsRbacTest-95556492", "password_expires_at": null}, "audit_ids": ["U0i5zmx-RhqENjtANRW77g"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "78fa27f34ea04b44bffd3aabe065dfa7", "name": "tempest-SecurtiyGroupsRbacTest-95556492"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_78fa27f34ea04b44bffd3aabe065dfa7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "inter _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.480 41 INFO tempest.lib.common.fixed_network [-] (SecurtiyGroupsRbacTest:setUpClass) Found network {'id': '5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3', 'name': 'tempest-SecurtiyGroupsRbacTest-821721193-network', 'tenant_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'admin_state_up': True, 'mtu': 1400, 'status': 'ACTIVE', 'subnets': [], 'shared': False, 'project_id': '78fa27f34ea04b44bffd3aabe065dfa7', 'port_security_enabled': True, 'qos_policy_id': None, 'dns_domain': '', 'router:external': False, 'provider:network_type': 'vxlan', 'provider:physical_network': None, 'provider:segmentation_id': 6, 'availability_zone_hints': [], 'is_default': False, 'availability_zones': [], 'ipv4_address_scope': None, 'ipv6_address_scope': None, 'description': '', 'l2_adjacency': True, 'tags': [], 'created_at': '2020-12-05T13:24:02Z', 'updated_at': '2020-12-05T13:24:02Z', 'revision_number': 1} available for tenant 2020-12-05 13:24:05.496 40 INFO tempest.lib.common.rest_client [req-330a29f0-98ec-4334-ab5b-f9202041c746 ] Request (ImageSizeRbacTest:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles/72a4576c553448cd941b052c1ca0cf2d 0.086s 2020-12-05 13:24:05.496 40 DEBUG tempest.lib.common.rest_client [req-330a29f0-98ec-4334-ab5b-f9202041c746 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-330a29f0-98ec-4334-ab5b-f9202041c746', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.531 39 INFO tempest.lib.common.rest_client [req-1633321a-b9f7-4814-b701-e1b29de48dd2 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.153s 2020-12-05 13:24:05.532 39 DEBUG tempest.lib.common.rest_client [req-1633321a-b9f7-4814-b701-e1b29de48dd2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "password": "U8_RoDm!!~p6Dy5", "project_id": "45083965a56643f4aaff2a805ccfa2a8", "email": "tempest-SecurityGroupsRbacMaxV235Test-2024940439@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1633321a-b9f7-4814-b701-e1b29de48dd2', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "45083965a56643f4aaff2a805ccfa2a8", "email": "tempest-SecurityGroupsRbacMaxV235Test-2024940439@example.com", "id": "78f1f1290e904912b1d8d30fc63b22d2", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/78f1f1290e904912b1d8d30fc63b22d2"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.596 40 INFO tempest.lib.common.rest_client [req-6d0c7e5f-110c-46cd-81c8-5f2e0b0752fe ] Request (ImageSizeRbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles/a629c95d64b3416fb80ae90af4f69c05 0.098s 2020-12-05 13:24:05.596 40 DEBUG tempest.lib.common.rest_client [req-6d0c7e5f-110c-46cd-81c8-5f2e0b0752fe ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6d0c7e5f-110c-46cd-81c8-5f2e0b0752fe', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2/users/bb3a51d5850a43be9beaed85009d7a11/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.709 38 INFO tempest.lib.common.rest_client [req-5ad32b21-4bac-4c60-8d6f-bb683834c663 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787/detail 0.526s 2020-12-05 13:24:05.709 38 DEBUG tempest.lib.common.rest_client [req-5ad32b21-4bac-4c60-8d6f-bb683834c663 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '917', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5ad32b21-4bac-4c60-8d6f-bb683834c663', 'x-compute-request-id': 'req-5ad32b21-4bac-4c60-8d6f-bb683834c663', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787/detail'} Body: b'{"quota_set": {"id": "1ee7c45edd2f4d50ac53c9ae24068787", "cores": {"limit": 20, "in_use": 0, "reserved": 0}, "fixed_ips": {"limit": -1, "in_use": 0, "reserved": 0}, "floating_ips": {"limit": -1, "in_use": 0, "reserved": 0}, "injected_file_content_bytes": {"limit": 10240, "in_use": 0, "reserved": 0}, "injected_file_path_bytes": {"limit": 255, "in_use": 0, "reserved": 0}, "injected_files": {"limit": 5, "in_use": 0, "reserved": 0}, "instances": {"limit": 10, "in_use": 0, "reserved": 0}, "key_pairs": {"limit": 100, "in_use": 0, "reserved": 0}, "metadata_items": {"limit": 128, "in_use": 0, "reserved": 0}, "ram": {"limit": 51200, "in_use": 0, "reserved": 0}, "security_group_rules": {"limit": -1, "in_use": 0, "reserved": 0}, "security_groups": {"limit": -1, "in_use": 0, "reserved": 0}, "server_group_members": {"limit": 10, "in_use": 0, "reserved": 0}, "server_groups": {"limit": 10, "in_use": 0, "reserved": 0}}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.722 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:05.759 39 INFO tempest.lib.common.rest_client [req-314315ae-9d16-40d8-aa0b-a0f72bf34dad ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.226s 2020-12-05 13:24:05.760 39 DEBUG tempest.lib.common.rest_client [req-314315ae-9d16-40d8-aa0b-a0f72bf34dad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-314315ae-9d16-40d8-aa0b-a0f72bf34dad', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.813 39 INFO tempest.lib.common.rest_client [req-31cb034a-8b89-46a9-a208-a0b51cf0d393 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.051s 2020-12-05 13:24:05.814 39 DEBUG tempest.lib.common.rest_client [req-31cb034a-8b89-46a9-a208-a0b51cf0d393 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-31cb034a-8b89-46a9-a208-a0b51cf0d393', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.823 38 INFO tempest.lib.common.rest_client [req-0630f69d-1f02-4233-bbff-d0e25d1aab71 ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.101s 2020-12-05 13:24:05.824 38 DEBUG tempest.lib.common.rest_client [req-0630f69d-1f02-4233-bbff-d0e25d1aab71 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0630f69d-1f02-4233-bbff-d0e25d1aab71', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.870 39 INFO tempest.lib.common.rest_client [req-02427c4e-2454-46a0-975c-fbbf6352c92e ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles/72a4576c553448cd941b052c1ca0cf2d 0.055s 2020-12-05 13:24:05.870 39 DEBUG tempest.lib.common.rest_client [req-02427c4e-2454-46a0-975c-fbbf6352c92e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-02427c4e-2454-46a0-975c-fbbf6352c92e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.871 39 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurityGroupsRbacMaxV235Test-83634119', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '45083965a56643f4aaff2a805ccfa2a8', 'project_name': 'tempest-SecurityGroupsRbacMaxV235Test-83634119', 'tenant_id': '45083965a56643f4aaff2a805ccfa2a8', 'tenant_name': 'tempest-SecurityGroupsRbacMaxV235Test-83634119', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '78f1f1290e904912b1d8d30fc63b22d2'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:05.872 39 INFO tempest.lib.common.dynamic_creds [-] Created isolated network resources for: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-SecurityGroupsRbacMaxV235Test-83634119', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '45083965a56643f4aaff2a805ccfa2a8', 'project_name': 'tempest-SecurityGroupsRbacMaxV235Test-83634119', 'tenant_id': '45083965a56643f4aaff2a805ccfa2a8', 'tenant_name': 'tempest-SecurityGroupsRbacMaxV235Test-83634119', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '78f1f1290e904912b1d8d30fc63b22d2'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:05.921 38 INFO tempest.lib.common.rest_client [req-df949bdf-ce6a-4458-83db-1b086f71912b ] Request (QuotaSetsRbacTest:test_show_quota_set_details): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.096s 2020-12-05 13:24:05.922 38 DEBUG tempest.lib.common.rest_client [req-df949bdf-ce6a-4458-83db-1b086f71912b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-df949bdf-ce6a-4458-83db-1b086f71912b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["47x0DV2hQgS4pwDkF3PHOA"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:05.927 38 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'admin', 'member', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:05.928 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.929 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.930 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.930 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.931 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.932 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.932 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.933 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.934 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.935 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.935 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.936 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.937 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.937 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.938 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.939 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.940 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.941 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.942 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.943 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.944 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.945 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.946 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.947 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.948 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.949 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.949 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.949 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.950 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.950 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.950 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.951 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.951 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.951 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.952 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.953 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.954 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.955 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.956 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.957 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.958 38 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:05.959 38 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-quota-sets:update, [Role]: ['admin', 'member', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:05.964 39 INFO tempest.lib.common.rest_client [req-a1cce82c-b0c9-4844-9220-07df26c35c38 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.084s 2020-12-05 13:24:05.965 39 DEBUG tempest.lib.common.rest_client [req-a1cce82c-b0c9-4844-9220-07df26c35c38 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6585', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a1cce82c-b0c9-4844-9220-07df26c35c38', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "78f1f1290e904912b1d8d30fc63b22d2", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "password_expires_at": null}, "audit_ids": ["jTpEizlVQH2Hi_XGfBvSFA"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45083965a56643f4aaff2a805ccfa2a8", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119"}, "is_domain": false, "roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": "public", "region_id": "RegionOne", "url _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.047 39 INFO tempest.lib.common.rest_client [req-71a8c9bc-3b66-4fa0-8c86-bc330cdbf9fd ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.080s 2020-12-05 13:24:06.048 39 DEBUG tempest.lib.common.rest_client [req-71a8c9bc-3b66-4fa0-8c86-bc330cdbf9fd ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-71a8c9bc-3b66-4fa0-8c86-bc330cdbf9fd', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["9Mb-RupJRvK-BLp_xxPVbg"], "expires_at": "2020-12-05T14:24:05.000000Z", "issued_at": "2020-12-05T13:24:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.092 39 INFO tempest.lib.common.rest_client [req-37a72a34-a7ba-411c-9e9e-9cc11a06ccc5 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.031s 2020-12-05 13:24:06.093 39 DEBUG tempest.lib.common.rest_client [req-37a72a34-a7ba-411c-9e9e-9cc11a06ccc5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-37a72a34-a7ba-411c-9e9e-9cc11a06ccc5', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["_A06iPu-Ty-ImFJq2_Kfmg"], "expires_at": "2020-12-05T14:24:06.000000Z", "issued_at": "2020-12-05T13:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.134 39 INFO tempest.lib.common.rest_client [req-3f8ed350-3c79-4dab-b71f-d5b84268a2cb ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/role_inferences 0.040s 2020-12-05 13:24:06.135 39 DEBUG tempest.lib.common.rest_client [req-3f8ed350-3c79-4dab-b71f-d5b84268a2cb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '699', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-3f8ed350-3c79-4dab-b71f-d5b84268a2cb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/role_inferences'} Body: b'{"role_inferences": [{"prior_role": {"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}, "implies": [{"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}, "name": "reader"}]}, {"prior_role": {"id": "a629c95d64b3416fb80ae90af4f69c05", "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}, "name": "admin"}, "implies": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}, "name": "member"}]}]}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.179 39 INFO tempest.lib.common.rest_client [req-6399c391-6f37-401e-9d0f-a3a4356d8edb ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.043s 2020-12-05 13:24:06.179 39 DEBUG tempest.lib.common.rest_client [req-6399c391-6f37-401e-9d0f-a3a4356d8edb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6399c391-6f37-401e-9d0f-a3a4356d8edb', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.180 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Available roles: dict_keys(['observer', 'reader', 'heat_stack_owner', 'ResellerAdmin', 'member', 'anotherrole', 'audit', 'key-manager:service-admin', 'creator', 'heat_stack_user', 'admin', 'service']) _init_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:340 2020-12-05 13:24:06.180 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:06.276 39 INFO tempest.lib.common.rest_client [req-707f10c6-cc14-45bb-b6eb-09baa3eae248 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 200 GET http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles 0.095s 2020-12-05 13:24:06.277 39 DEBUG tempest.lib.common.rest_client [req-707f10c6-cc14-45bb-b6eb-09baa3eae248 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '412', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-707f10c6-cc14-45bb-b6eb-09baa3eae248', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles'} Body: b'{"roles": [{"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.341 39 INFO tempest.lib.common.rest_client [req-c7a255ad-94c9-4ce9-a3e6-601e5bcb28ca ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 DELETE http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles/72a4576c553448cd941b052c1ca0cf2d 0.063s 2020-12-05 13:24:06.342 39 DEBUG tempest.lib.common.rest_client [req-c7a255ad-94c9-4ce9-a3e6-601e5bcb28ca ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c7a255ad-94c9-4ce9-a3e6-601e5bcb28ca', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.344 38 INFO tempest.lib.common.rest_client [req-4c5a7869-ff14-447c-a3db-296fe3dc033c ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787/defaults 0.384s 2020-12-05 13:24:06.344 38 DEBUG tempest.lib.common.rest_client [req-4c5a7869-ff14-447c-a3db-296fe3dc033c ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '371', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-4c5a7869-ff14-447c-a3db-296fe3dc033c', 'x-compute-request-id': 'req-4c5a7869-ff14-447c-a3db-296fe3dc033c', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787/defaults'} Body: b'{"quota_set": {"id": "1ee7c45edd2f4d50ac53c9ae24068787", "cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.348 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:06.448 38 INFO tempest.lib.common.rest_client [req-27219f11-3362-4b20-bd68-740c160db901 ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.099s 2020-12-05 13:24:06.449 38 DEBUG tempest.lib.common.rest_client [req-27219f11-3362-4b20-bd68-740c160db901 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-27219f11-3362-4b20-bd68-740c160db901', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.449 39 INFO tempest.lib.common.rest_client [req-cd36f23e-068f-4605-9b9b-23327720b66d ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles/a629c95d64b3416fb80ae90af4f69c05 0.106s 2020-12-05 13:24:06.450 39 DEBUG tempest.lib.common.rest_client [req-cd36f23e-068f-4605-9b9b-23327720b66d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cd36f23e-068f-4605-9b9b-23327720b66d', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles/a629c95d64b3416fb80ae90af4f69c05'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.538 38 INFO tempest.lib.common.rest_client [req-09a085ba-a8e2-48f4-903a-369abdfe1b54 ] Request (QuotaSetsRbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:24:06.539 38 DEBUG tempest.lib.common.rest_client [req-09a085ba-a8e2-48f4-903a-369abdfe1b54 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-09a085ba-a8e2-48f4-903a-369abdfe1b54', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["XSjQ0f7MRBC7Y6Cl_hxplA"], "expires_at": "2020-12-05T14:24:06.000000Z", "issued_at": "2020-12-05T13:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.668 41 INFO tempest.lib.common.rest_client [req-85286fe6-4d43-49d1-af6a-34c920dee4e5 ] Request (SecurtiyGroupsRbacTest:setUpClass): 202 POST http://172.30.13.94/compute/v2.1/servers 1.186s 2020-12-05 13:24:06.669 41 DEBUG tempest.lib.common.rest_client [req-85286fe6-4d43-49d1-af6a-34c920dee4e5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"server": {"name": "tempest-SecurtiyGroupsRbacTest-server-1300062205", "imageRef": "ea31bd24-c485-4379-b2df-6f414a2f50d9", "flavorRef": "7f08d304-dde5-4abb-ab77-f7ebcff62b95", "networks": [{"uuid": "5c86e941-1302-4ab8-b6ea-5fa9f8f3c0e3"}]}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:05 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '382', 'location': 'http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-85286fe6-4d43-49d1-af6a-34c920dee4e5', 'x-compute-request-id': 'req-85286fe6-4d43-49d1-af6a-34c920dee4e5', 'connection': 'close', 'status': '202', 'content-location': 'http://172.30.13.94/compute/v2.1/servers'} Body: b'{"server": {"id": "f4d5c37c-7067-4bd2-a5f0-185224a6e698", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "default"}], "adminPass": "D4UQuvFaJnBT"}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.686 40 INFO tempest.lib.common.rest_client [req-a5867b47-1848-47f4-a8c8-830e428ab8fb ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.087s 2020-12-05 13:24:06.687 40 DEBUG tempest.lib.common.rest_client [req-a5867b47-1848-47f4-a8c8-830e428ab8fb ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-a5867b47-1848-47f4-a8c8-830e428ab8fb', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "bb3a51d5850a43be9beaed85009d7a11", "name": "tempest-ImageSizeRbacTest-550674434", "password_expires_at": null}, "audit_ids": ["6-ZsJxa_RLazId-z2Ldpbw"], "expires_at": "2020-12-05T14:24:06.000000Z", "issued_at": "2020-12-05T13:24:06.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "fc893de3ad4d471e9a8edec65cd8a6f2", "name": "tempest-ImageSizeRbacTest-550674434"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_fc893de3ad4d471e9a8edec65cd8a6f2", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.771 41 INFO tempest.lib.common.rest_client [req-5f08d798-5ac0-4ae0-b56e-d62625f95fc0 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698 0.096s 2020-12-05 13:24:06.772 41 DEBUG tempest.lib.common.rest_client [req-5f08d798-5ac0-4ae0-b56e-d62625f95fc0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1398', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-5f08d798-5ac0-4ae0-b56e-d62625f95fc0', 'x-compute-request-id': 'req-5f08d798-5ac0-4ae0-b56e-d62625f95fc0', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698'} Body: b'{"server": {"id": "f4d5c37c-7067-4bd2-a5f0-185224a6e698", "name": "tempest-SecurtiyGroupsRbacTest-server-1300062205", "status": "BUILD", "tenant_id": "78fa27f34ea04b44bffd3aabe065dfa7", "user_id": "df7e010d09144cbc959e54f10790c733", "metadata": {}, "hostId": "", "image": {"id": "ea31bd24-c485-4379-b2df-6f414a2f50d9", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}]}, "flavor": {"id": "7f08d304-dde5-4abb-ab77-f7ebcff62b95", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/7f08d304-dde5-4abb-ab77-f7ebcff62b95"}]}, "created": "2020-12-05T13:24:07Z", "updated": "2020-12-05T13:24:06Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.829 38 INFO tempest.lib.common.rest_client [req-808aa98d-3415-466d-ba2c-0d9f692fe23f ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787 0.288s 2020-12-05 13:24:06.829 38 DEBUG tempest.lib.common.rest_client [req-808aa98d-3415-466d-ba2c-0d9f692fe23f ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"force": true, "injected_file_content_bytes": 20480}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '329', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-808aa98d-3415-466d-ba2c-0d9f692fe23f', 'x-compute-request-id': 'req-808aa98d-3415-466d-ba2c-0d9f692fe23f', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787'} Body: b'{"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 20480, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.838 38 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:06.953 40 INFO tempest.lib.common.rest_client [req-cc67c11e-3f25-4bc1-88a6-15eb00e4c198 ] Request (ImageSizeRbacTest:setUpClass): 201 POST http://172.30.13.94/image/v2/images 0.264s 2020-12-05 13:24:06.954 40 DEBUG tempest.lib.common.rest_client [req-cc67c11e-3f25-4bc1-88a6-15eb00e4c198 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"name": "tempest-ImageSizeRbacTest-image-1338473781"} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '646', 'content-type': 'application/json', 'location': 'http://127.0.0.1:60999/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc', 'openstack-image-import-methods': 'glance-direct,web-download,copy-image', 'x-openstack-request-id': 'req-cc67c11e-3f25-4bc1-88a6-15eb00e4c198', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/image/v2/images'} Body: b'{"name": "tempest-ImageSizeRbacTest-image-1338473781", "disk_format": null, "container_format": null, "visibility": "shared", "size": null, "virtual_size": null, "status": "queued", "checksum": null, "protected": false, "min_ram": 0, "min_disk": 0, "owner": "fc893de3ad4d471e9a8edec65cd8a6f2", "os_hidden": false, "os_hash_algo": null, "os_hash_value": null, "id": "f1d054a0-546e-4347-a6fe-edf35efa72bc", "created_at": "2020-12-05T13:24:07Z", "updated_at": "2020-12-05T13:24:07Z", "tags": [], "self": "/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc", "file": "/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc/file", "schema": "/v2/schemas/image"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:06.996 38 INFO tempest.lib.common.rest_client [req-9a514df6-1010-445c-b39e-3b318e8132dc ] Request (QuotaSetsRbacTest:test_update_quota_set): 200 GET http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles 0.157s 2020-12-05 13:24:06.996 38 DEBUG tempest.lib.common.rest_client [req-9a514df6-1010-445c-b39e-3b318e8132dc ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-9a514df6-1010-445c-b39e-3b318e8132dc', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787/users/d744e1fde8ac4c63b6c6d1f9ef856a8e/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.022 40 INFO tempest.lib.common.rest_client [req-1ffeeb6c-7c44-45ed-b232-cd8a8f3d5571 ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/image/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc 0.064s 2020-12-05 13:24:07.022 40 DEBUG tempest.lib.common.rest_client [req-1ffeeb6c-7c44-45ed-b232-cd8a8f3d5571 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'text/html; charset=UTF-8', 'x-openstack-request-id': 'req-1ffeeb6c-7c44-45ed-b232-cd8a8f3d5571', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/image/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.044 40 INFO tempest.lib.common.rest_client [req-0c503192-ae20-4b19-b603-aede25cba4f7 ] Request (ImageSizeRbacTest:tearDownClass): 404 GET http://172.30.13.94/image/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc 0.021s 2020-12-05 13:24:07.044 40 DEBUG tempest.lib.common.rest_client [req-0c503192-ae20-4b19-b603-aede25cba4f7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '139', 'content-type': 'application/json', 'x-openstack-request-id': 'req-0c503192-ae20-4b19-b603-aede25cba4f7', 'connection': 'close', 'status': '404', 'content-location': 'http://172.30.13.94/image/v2/images/f1d054a0-546e-4347-a6fe-edf35efa72bc'} Body: b'{"message": "No image found with ID f1d054a0-546e-4347-a6fe-edf35efa72bc

\\n\\n\\n", "code": "404 Not Found", "title": "Not Found"}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.088 38 INFO tempest.lib.common.rest_client [req-375f5bfc-d355-4f75-a0ce-0c06f7d3397b ] Request (QuotaSetsRbacTest:test_update_quota_set): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-05 13:24:07.089 38 DEBUG tempest.lib.common.rest_client [req-375f5bfc-d355-4f75-a0ce-0c06f7d3397b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:06 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6624', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-375f5bfc-d355-4f75-a0ce-0c06f7d3397b', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "d744e1fde8ac4c63b6c6d1f9ef856a8e", "name": "tempest-QuotaSetsRbacTest-523392142", "password_expires_at": null}, "audit_ids": ["Ye81AQeBQ8q6FETcPrGFHw"], "expires_at": "2020-12-05T14:24:07.000000Z", "issued_at": "2020-12-05T13:24:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "1ee7c45edd2f4d50ac53c9ae24068787", "name": "tempest-QuotaSetsRbacTest-523392142"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_1ee7c45edd2f4d50ac53c9ae24068787", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5bafc7d9e", "interface": " _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.258 40 INFO tempest.lib.common.rest_client [req-43243504-7662-4b9d-baa2-7b1315c986ad ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/bb3a51d5850a43be9beaed85009d7a11 0.213s 2020-12-05 13:24:07.259 40 DEBUG tempest.lib.common.rest_client [req-43243504-7662-4b9d-baa2-7b1315c986ad ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-43243504-7662-4b9d-baa2-7b1315c986ad', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/bb3a51d5850a43be9beaed85009d7a11'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.352 40 INFO tempest.lib.common.rest_client [req-6987f8dd-515d-453f-9f73-596c1566d32d ] Request (ImageSizeRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.092s 2020-12-05 13:24:07.353 40 DEBUG tempest.lib.common.rest_client [req-6987f8dd-515d-453f-9f73-596c1566d32d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-6987f8dd-515d-453f-9f73-596c1566d32d', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["9DzCMmN7TGSwUCCzJd3bnA"], "expires_at": "2020-12-05T14:24:07.000000Z", "issued_at": "2020-12-05T13:24:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.543 39 INFO tempest.lib.common.rest_client [req-d9a915fa-9361-4a3e-8feb-668bc626ef40 ] Request (SecurityGroupsRbacMaxV235Test:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.091s 2020-12-05 13:24:07.544 39 DEBUG tempest.lib.common.rest_client [req-d9a915fa-9361-4a3e-8feb-668bc626ef40 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-d9a915fa-9361-4a3e-8feb-668bc626ef40', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "78f1f1290e904912b1d8d30fc63b22d2", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "password_expires_at": null}, "audit_ids": ["xE3muofIRYu3XYxpmTQjBA"], "expires_at": "2020-12-05T14:24:07.000000Z", "issued_at": "2020-12-05T13:24:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45083965a56643f4aaff2a805ccfa2a8", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.546 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:07.547 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.548 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.549 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.550 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.551 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.552 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.553 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.554 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.555 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.556 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.557 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.557 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.557 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.558 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.558 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.558 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.558 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.559 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.559 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.559 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.560 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.560 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.560 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.561 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.561 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.561 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.562 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.562 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.562 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.562 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.563 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.563 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.563 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.564 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.564 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.564 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.564 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.565 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.565 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.565 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.566 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.566 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.566 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.567 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.567 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.568 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.568 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.568 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.569 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.569 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.569 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.570 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.570 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.570 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.571 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.571 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.571 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.571 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:07.573 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:create, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:07.573 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:07.607 38 INFO tempest.lib.common.rest_client [req-682ac85e-17f9-4be4-8f40-1adaf55ef6b9 ] Request (QuotaSetsRbacTest:_run_cleanups): 200 PUT http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787 0.516s 2020-12-05 13:24:07.608 38 DEBUG tempest.lib.common.rest_client [req-682ac85e-17f9-4be4-8f40-1adaf55ef6b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '329', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-682ac85e-17f9-4be4-8f40-1adaf55ef6b9', 'x-compute-request-id': 'req-682ac85e-17f9-4be4-8f40-1adaf55ef6b9', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-quota-sets/1ee7c45edd2f4d50ac53c9ae24068787'} Body: b'{"quota_set": {"cores": 20, "fixed_ips": -1, "floating_ips": -1, "injected_file_content_bytes": 10240, "injected_file_path_bytes": 255, "injected_files": 5, "instances": 10, "key_pairs": 100, "metadata_items": 128, "ram": 51200, "security_group_rules": -1, "security_groups": -1, "server_group_members": 10, "server_groups": 10}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.632 39 INFO tempest.lib.common.rest_client [req-eddd3e3c-3b69-437c-b5fe-df04ac4fcf09 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles 0.058s 2020-12-05 13:24:07.633 39 DEBUG tempest.lib.common.rest_client [req-eddd3e3c-3b69-437c-b5fe-df04ac4fcf09 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eddd3e3c-3b69-437c-b5fe-df04ac4fcf09', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.670 39 INFO tempest.lib.common.rest_client [req-4711f501-40c4-48d8-84cf-3f91ecbcdb46 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.036s 2020-12-05 13:24:07.670 39 DEBUG tempest.lib.common.rest_client [req-4711f501-40c4-48d8-84cf-3f91ecbcdb46 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-4711f501-40c4-48d8-84cf-3f91ecbcdb46', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "78f1f1290e904912b1d8d30fc63b22d2", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "password_expires_at": null}, "audit_ids": ["SccOZM8eRAmr93gN5hM0ew"], "expires_at": "2020-12-05T14:24:07.000000Z", "issued_at": "2020-12-05T13:24:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45083965a56643f4aaff2a805ccfa2a8", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.726 40 INFO tempest.lib.common.rest_client [req-4f4124d1-ab6e-4b79-b15d-5ac4aef463a4 ] Request (ImageSizeRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fc893de3ad4d471e9a8edec65cd8a6f2&name=default 0.372s 2020-12-05 13:24:07.726 40 DEBUG tempest.lib.common.rest_client [req-4f4124d1-ab6e-4b79-b15d-5ac4aef463a4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-4f4124d1-ab6e-4b79-b15d-5ac4aef463a4', 'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=fc893de3ad4d471e9a8edec65cd8a6f2&name=default'} Body: b'{"security_groups": [{"id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "name": "default", "stateful": true, "tenant_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "description": "Default security group", "security_group_rules": [{"id": "41b62490-bb5f-468e-9e79-f60cb5e04c1f", "tenant_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "security_group_id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "description": null, "tags": [], "created_at": "2020-12-05T13:24:07Z", "updated_at": "2020-12-05T13:24:07Z", "revision_number": 0, "project_id": "fc893de3ad4d471e9a8edec65cd8a6f2"}, {"id": "42c330f3-ef18-450d-8349-6aaf7ec57df8", "tenant_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "security_group_id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "description": null, "tags": [], "created_at": "2020-12-05T13:24:07Z", "updated_at": "2020-12-05T13:24:07Z", "revision_number": 0, "project_id": "fc893de3ad4d471e9a8edec65cd8a6f2"}, {"id": "64b045ae-78cb-4fea-96e2-13aef409a197", "tenant_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "security_group_id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:07Z", "updated_at": "2020-12-05T13:24:07Z", "revision_number": 0, "project_id": "fc893de3ad4d471e9a8edec65cd8a6f2"}, {"id": "e9bfb4a8-2e52-488e-b0d7-1697ba3152b8", "tenant_id": "fc893de3ad4d471e9a8edec65cd8a6f2", "security_group_id": "be62ebec-33f4-4432-a08e-a9d851c82f91", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:07Z", "updated_at": "2020-12-05T13:24:07Z", "revision_number": 0, "project_id": "fc893de3ad4d471e9a8edec65cd8a6f2"}], "tags": [], "created_at": "2020-12-05T13:24:07Z", "updated_at": "2020-12-05T13:24:07Z", "revision_number": 1, "project_id": "fc893de3ad4d471e9a8edec65cd8a6f2"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.758 38 INFO tempest.lib.common.rest_client [req-90b169f6-a886-4c1d-9f2d-19b6bcf8f3f8 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/d744e1fde8ac4c63b6c6d1f9ef856a8e 0.140s 2020-12-05 13:24:07.759 38 DEBUG tempest.lib.common.rest_client [req-90b169f6-a886-4c1d-9f2d-19b6bcf8f3f8 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-90b169f6-a886-4c1d-9f2d-19b6bcf8f3f8', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/d744e1fde8ac4c63b6c6d1f9ef856a8e'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.850 38 INFO tempest.lib.common.rest_client [req-0f9c4456-8b48-4575-850d-f64b01c24198 ] Request (QuotaSetsRbacTest:tearDownClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:24:07.851 38 DEBUG tempest.lib.common.rest_client [req-0f9c4456-8b48-4575-850d-f64b01c24198 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0f9c4456-8b48-4575-850d-f64b01c24198', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["VGlPLsQ2Q1a67wGWtDoG2A"], "expires_at": "2020-12-05T14:24:07.000000Z", "issued_at": "2020-12-05T13:24:07.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.883 40 INFO tempest.lib.common.rest_client [req-32432d49-cc47-4ec7-a116-538185369067 ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/be62ebec-33f4-4432-a08e-a9d851c82f91 0.156s 2020-12-05 13:24:07.884 40 DEBUG tempest.lib.common.rest_client [req-32432d49-cc47-4ec7-a116-538185369067 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-32432d49-cc47-4ec7-a116-538185369067', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/be62ebec-33f4-4432-a08e-a9d851c82f91'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.918 41 INFO tempest.lib.common.rest_client [req-c2425652-4db3-43b8-9a0e-df6bbb663632 ] Request (SecurtiyGroupsRbacTest:setUpClass): 200 GET http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698 0.129s 2020-12-05 13:24:07.919 41 DEBUG tempest.lib.common.rest_client [req-c2425652-4db3-43b8-9a0e-df6bbb663632 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '1485', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-c2425652-4db3-43b8-9a0e-df6bbb663632', 'x-compute-request-id': 'req-c2425652-4db3-43b8-9a0e-df6bbb663632', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698'} Body: b'{"server": {"id": "f4d5c37c-7067-4bd2-a5f0-185224a6e698", "name": "tempest-SecurtiyGroupsRbacTest-server-1300062205", "status": "BUILD", "tenant_id": "78fa27f34ea04b44bffd3aabe065dfa7", "user_id": "df7e010d09144cbc959e54f10790c733", "metadata": {}, "hostId": "57fe3882a523aefd7e23720e86715e37f06f49319aac9cc03e492e27", "image": {"id": "ea31bd24-c485-4379-b2df-6f414a2f50d9", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/images/ea31bd24-c485-4379-b2df-6f414a2f50d9"}]}, "flavor": {"id": "7f08d304-dde5-4abb-ab77-f7ebcff62b95", "links": [{"rel": "bookmark", "href": "http://172.30.13.94/compute/flavors/7f08d304-dde5-4abb-ab77-f7ebcff62b95"}]}, "created": "2020-12-05T13:24:06Z", "updated": "2020-12-05T13:24:08Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "http://172.30.13.94/compute/v2.1/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698"}, {"rel": "bookmark", "href": "http://172.30.13.94/compute/servers/f4d5c37c-7067-4bd2-a5f0-185224a6e698"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "nova", "config_drive": "", "key_name": null, "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": "lf-virtual9", "OS-EXT-SRV-ATTR:instance_name": "instance-0000a408", "OS-EXT-SRV-ATTR:hypervisor_hostname": "lf-virtual9", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": []}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:07.929 41 INFO tempest.common.waiters [-] State transition "BUILD/scheduling" ==> "BUILD/None" after 1 second wait 2020-12-05 13:24:08.009 40 INFO tempest.lib.common.rest_client [req-fd6aff87-69d9-4253-a1a2-319f2249b825 ] Request (ImageSizeRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2 0.123s 2020-12-05 13:24:08.009 40 DEBUG tempest.lib.common.rest_client [req-fd6aff87-69d9-4253-a1a2-319f2249b825 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd6aff87-69d9-4253-a1a2-319f2249b825', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/fc893de3ad4d471e9a8edec65cd8a6f2'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.089 40 INFO tempest.lib.common.rest_client [req-e6812c53-a542-49c6-8625-0f860e16a399 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.077s 2020-12-05 13:24:08.090 40 DEBUG tempest.lib.common.rest_client [req-e6812c53-a542-49c6-8625-0f860e16a399 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-e6812c53-a542-49c6-8625-0f860e16a399', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["NYzXAJQuRmWaly4mq_VOkg"], "expires_at": "2020-12-05T14:24:08.000000Z", "issued_at": "2020-12-05T13:24:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.143 40 INFO tempest.lib.common.rest_client [req-0b02ac39-3c8e-42eb-89d5-4b98daf862ea ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.045s 2020-12-05 13:24:08.144 40 DEBUG tempest.lib.common.rest_client [req-0b02ac39-3c8e-42eb-89d5-4b98daf862ea ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-0b02ac39-3c8e-42eb-89d5-4b98daf862ea', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["iXJJA4TtRAiv4GwIHbbWWw"], "expires_at": "2020-12-05T14:24:08.000000Z", "issued_at": "2020-12-05T13:24:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.158 38 INFO tempest.lib.common.rest_client [req-f9e93209-cbaf-4920-9560-6fb772ea93b9 ] Request (QuotaSetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1ee7c45edd2f4d50ac53c9ae24068787&name=default 0.306s 2020-12-05 13:24:08.159 38 DEBUG tempest.lib.common.rest_client [req-f9e93209-cbaf-4920-9560-6fb772ea93b9 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f9e93209-cbaf-4920-9560-6fb772ea93b9', 'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1ee7c45edd2f4d50ac53c9ae24068787&name=default'} Body: b'{"security_groups": [{"id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "name": "default", "stateful": true, "tenant_id": "1ee7c45edd2f4d50ac53c9ae24068787", "description": "Default security group", "security_group_rules": [{"id": "16cebeec-63b2-4b2b-94fd-824a0fb128b4", "tenant_id": "1ee7c45edd2f4d50ac53c9ae24068787", "security_group_id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1ee7c45edd2f4d50ac53c9ae24068787"}, {"id": "be039bdd-4405-4856-988b-f5b6cd537148", "tenant_id": "1ee7c45edd2f4d50ac53c9ae24068787", "security_group_id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1ee7c45edd2f4d50ac53c9ae24068787"}, {"id": "c79bb388-9820-4f10-b4ab-a0f568ea4f5e", "tenant_id": "1ee7c45edd2f4d50ac53c9ae24068787", "security_group_id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1ee7c45edd2f4d50ac53c9ae24068787"}, {"id": "eccd92f0-9bef-476d-84c1-dc8240658e9f", "tenant_id": "1ee7c45edd2f4d50ac53c9ae24068787", "security_group_id": "0d29e5f9-9f28-43ce-ab2f-e5b46bef0239", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1ee7c45edd2f4d50ac53c9ae24068787"}], "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 1, "project_id": "1ee7c45edd2f4d50ac53c9ae24068787"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.166 39 INFO tempest.lib.common.rest_client [req-fab611a2-9ebb-4e2a-b908-0f15e5369de2 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.495s 2020-12-05 13:24:08.167 39 DEBUG tempest.lib.common.rest_client [req-fab611a2-9ebb-4e2a-b908-0f15e5369de2 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1173599905", "description": "tempest-description-1418045"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:07 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '248', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-fab611a2-9ebb-4e2a-b908-0f15e5369de2', 'x-compute-request-id': 'req-fab611a2-9ebb-4e2a-b908-0f15e5369de2', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "b67a005a-abcf-4071-9dff-81f34c4378c2", "description": "tempest-description-1418045", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1173599905", "tenant_id": "45083965a56643f4aaff2a805ccfa2a8", "rules": []}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.173 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: False. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:08.207 40 INFO tempest.lib.common.rest_client [req-af591f76-bb5a-4087-9f2c-8fec3c1fcf04 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/domains?name=Default 0.062s 2020-12-05 13:24:08.207 40 DEBUG tempest.lib.common.rest_client [req-af591f76-bb5a-4087-9f2c-8fec3c1fcf04 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '310', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-af591f76-bb5a-4087-9f2c-8fec3c1fcf04', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/domains?name=Default'} Body: b'{"domains": [{"id": "default", "name": "Default", "description": "The default domain", "enabled": true, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/domains/default"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/domains?name=Default", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.227 39 INFO tempest.lib.common.rest_client [req-fd3ed2ca-fbcc-4c9d-8dbb-bde118b166c4 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles 0.053s 2020-12-05 13:24:08.228 39 DEBUG tempest.lib.common.rest_client [req-fd3ed2ca-fbcc-4c9d-8dbb-bde118b166c4 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fd3ed2ca-fbcc-4c9d-8dbb-bde118b166c4', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.265 40 INFO tempest.lib.common.rest_client [req-8e013670-fb18-4150-99c4-e3e68d00d1c0 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/projects 0.056s 2020-12-05 13:24:08.265 40 DEBUG tempest.lib.common.rest_client [req-8e013670-fb18-4150-99c4-e3e68d00d1c0 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"project": {"description": "tempest-ServerActionsV214RbacTest-1416270533-desc", "domain_id": "default", "name": "tempest-ServerActionsV214RbacTest-1416270533"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '388', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-8e013670-fb18-4150-99c4-e3e68d00d1c0', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/projects'} Body: b'{"project": {"id": "6161f111bac042e787eb9466e49897d7", "name": "tempest-ServerActionsV214RbacTest-1416270533", "domain_id": "default", "description": "tempest-ServerActionsV214RbacTest-1416270533-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/projects/6161f111bac042e787eb9466e49897d7"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.317 39 INFO tempest.lib.common.rest_client [req-2edfc5e6-2baa-4f7e-b180-860cf313d961 ] Request (SecurityGroupsRbacMaxV235Test:test_create_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.088s 2020-12-05 13:24:08.318 39 DEBUG tempest.lib.common.rest_client [req-2edfc5e6-2baa-4f7e-b180-860cf313d961 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-2edfc5e6-2baa-4f7e-b180-860cf313d961', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "78f1f1290e904912b1d8d30fc63b22d2", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119", "password_expires_at": null}, "audit_ids": ["adJ3qCwvQVyCy2Bk3TOIIg"], "expires_at": "2020-12-05T14:24:08.000000Z", "issued_at": "2020-12-05T13:24:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "45083965a56643f4aaff2a805ccfa2a8", "name": "tempest-SecurityGroupsRbacMaxV235Test-83634119"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_45083965a56643f4aaff2a805ccfa2a8", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c0439c9b241068a640ce5baf _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.322 39 DEBUG patrole_tempest_plugin.rbac_utils [-] All needed roles: {'member', 'admin', 'reader'}; Base roles: ['admin'] get_all_needed_roles /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:245 2020-12-05 13:24:08.322 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_admin_api":"role:admin and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.323 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "system_reader_api":"role:reader and system_scope:all". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.323 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_api":"is_admin:True" was deprecated in 21.0.0 in favor of "project_admin_api":"role:admin and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.323 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "project_member_api":"role:member and project_id:%(project_id)s". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.324 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_admin_or_owner":"rule:system_admin_api or rule:project_member_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.324 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "rule:admin_or_owner":"is_admin:True or project_id:%(project_id)s" was deprecated in 21.0.0 in favor of "system_or_project_reader":"rule:system_reader_api or rule:project_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.324 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.325 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:create":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.325 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.325 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-agents":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-agents:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.326 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.326 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.326 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.327 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-attach-interfaces":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-attach-interfaces:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.327 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.327 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-baremetal-nodes":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-baremetal-nodes:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.327 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:restore":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.328 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-deferred-delete":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-deferred-delete:force":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.328 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-flavor-access":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-flavor-access":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.328 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.329 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.329 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.329 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.330 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.330 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-floating-ips":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-floating-ips:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.330 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.330 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.331 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.331 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:reboot":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.331 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:shutdown":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.332 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hosts":"rule:admin_api" was deprecated in 22.0.0 in favor of "os_compute_api:os-hosts:start":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.332 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.332 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:list-detail":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.332 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:statistics":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.333 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.333 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:uptime":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.333 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:search":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-hypervisors":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-hypervisors:servers":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-actions":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-actions:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.334 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-instance-usage-audit-log":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-instance-usage-audit-log:show":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-used-limits":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:limits:other_project":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.335 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.336 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-multinic":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-multinic:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.336 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.336 38 INFO tempest.lib.common.rest_client [req-aa17f4ed-3142-4d84-9469-32d9a7453fab ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/0d29e5f9-9f28-43ce-ab2f-e5b46bef0239 0.175s 2020-12-05 13:24:08.336 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-networks:view":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.336 38 DEBUG tempest.lib.common.rest_client [req-aa17f4ed-3142-4d84-9469-32d9a7453fab ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-aa17f4ed-3142-4d84-9469-32d9a7453fab', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/0d29e5f9-9f28-43ce-ab2f-e5b46bef0239'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-rescue":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-unrescue":"rule:system_admin_or_owner". Reason: Rescue/Unrescue API policies are made granular with new policy for unrescue and keeping old policy for rescue. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:get":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.337 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:update":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.338 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-security-groups:rule:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:add":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.339 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-security-groups":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-security-groups:remove":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.340 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-server-password":"rule:admin_or_owner" was deprecated in 21.0.0 in favor of "os_compute_api:os-server-password:clear":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:list":"rule:system_reader_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:update":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-services":"rule:admin_api" was deprecated in 21.0.0 in favor of "os_compute_api:os-services:delete":"rule:system_admin_api". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.341 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-tenant-networks":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-tenant-networks:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.342 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.343 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:list":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:create":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:detail":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.344 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:show":"rule:system_or_project_reader". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.345 39 WARNING patrole_tempest_plugin.policy_authority [-] Policy "os_compute_api:os-volumes":"rule:admin_or_owner" was deprecated in 22.0.0 in favor of "os_compute_api:os-volumes:snapshots:delete":"rule:system_admin_or_owner". Reason: Nova API policies are introducing new default roles with scope_type capabilities. Old policies are deprecated and silently going to be ignored in nova 23.0.0 release. . Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. 2020-12-05 13:24:08.346 39 DEBUG patrole_tempest_plugin.rbac_rule_validation [-] [Policy action]: os_compute_api:os-security-groups:delete, [Role]: ['member', 'admin', 'reader'] is allowed! _is_authorized /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_rule_validation.py:365 2020-12-05 13:24:08.387 40 INFO tempest.lib.common.rest_client [req-cad00346-31f5-41c2-9105-76cc3d9e5ade ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/users 0.121s 2020-12-05 13:24:08.388 40 DEBUG tempest.lib.common.rest_client [req-cad00346-31f5-41c2-9105-76cc3d9e5ade ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"user": {"name": "tempest-ServerActionsV214RbacTest-1416270533", "password": "Z5%%e9Qca&44K_s", "project_id": "6161f111bac042e787eb9466e49897d7", "email": "tempest-ServerActionsV214RbacTest-493624287@example.com"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '405', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-cad00346-31f5-41c2-9105-76cc3d9e5ade', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/users'} Body: b'{"user": {"project_id": "6161f111bac042e787eb9466e49897d7", "email": "tempest-ServerActionsV214RbacTest-493624287@example.com", "id": "455e40f31ebb4fafa67c27ba4e8977a7", "name": "tempest-ServerActionsV214RbacTest-1416270533", "domain_id": "default", "enabled": true, "password_expires_at": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/users/455e40f31ebb4fafa67c27ba4e8977a7"}}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.442 40 INFO tempest.lib.common.rest_client [req-c6686b4f-8aa9-4e9f-b3fd-88d6703e6264 ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.052s 2020-12-05 13:24:08.442 40 DEBUG tempest.lib.common.rest_client [req-c6686b4f-8aa9-4e9f-b3fd-88d6703e6264 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-c6686b4f-8aa9-4e9f-b3fd-88d6703e6264', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.470 38 INFO tempest.lib.common.rest_client [req-b76aca72-d03c-4740-8bbc-82b10df8897e ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787 0.132s 2020-12-05 13:24:08.470 38 DEBUG tempest.lib.common.rest_client [req-b76aca72-d03c-4740-8bbc-82b10df8897e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-b76aca72-d03c-4740-8bbc-82b10df8897e', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/1ee7c45edd2f4d50ac53c9ae24068787'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.547 40 INFO tempest.lib.common.rest_client [req-fdded90f-348d-4663-9d08-38c0a152826e ] Request (ServerActionsV214RbacTest:setUpClass): 200 GET http://172.30.13.94/identity/v3/roles 0.103s 2020-12-05 13:24:08.547 40 DEBUG tempest.lib.common.rest_client [req-fdded90f-348d-4663-9d08-38c0a152826e ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '2727', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-fdded90f-348d-4663-9d08-38c0a152826e', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/roles'} Body: b'{"roles": [{"id": "0f5fe54d5c064e069447451a6530cd87", "name": "observer", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/0f5fe54d5c064e069447451a6530cd87"}}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e19bcd7bbf942efbf11ab49e65f6b38"}}, {"id": "1e2fd39799bd48bfaa2d6132adc54b25", "name": "heat_stack_owner", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/1e2fd39799bd48bfaa2d6132adc54b25"}}, {"id": "51634487a3fc4a00bd1411f41e0326b0", "name": "ResellerAdmin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/51634487a3fc4a00bd1411f41e0326b0"}}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/72a4576c553448cd941b052c1ca0cf2d"}}, {"id": "86f8ea2b760442fabae04d55783beaf4", "name": "anotherrole", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/86f8ea2b760442fabae04d55783beaf4"}}, {"id": "89da7f53900a443fa9fe41a21d4b63df", "name": "audit", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/89da7f53900a443fa9fe41a21d4b63df"}}, {"id": "8d6fecaece7b41afbf1fd9e568131f1c", "name": "key-manager:service-admin", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/8d6fecaece7b41afbf1fd9e568131f1c"}}, {"id": "9b582807d44849fbb78df8dab4b72c66", "name": "creator", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9b582807d44849fbb78df8dab4b72c66"}}, {"id": "9fbcc5b91a7e44b9a78a708a91dbafab", "name": "heat_stack_user", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/9fbcc5b91a7e44b9a78a708a91dbafab"}}, {"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}, {"id": "b9bd62aa01a44198ac072375ec4c7580", "name": "service", "domain_id": null, "description": null, "options": {}, "links": {"self": "http://172.30.13.94/identity/v3/roles/b9bd62aa01a44198ac072375ec4c7580"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.626 40 INFO tempest.lib.common.rest_client [req-1953aad4-793f-4506-be5a-97cc0cf36d7b ] Request (ServerActionsV214RbacTest:setUpClass): 204 PUT http://172.30.13.94/identity/v3/projects/6161f111bac042e787eb9466e49897d7/users/455e40f31ebb4fafa67c27ba4e8977a7/roles/72a4576c553448cd941b052c1ca0cf2d 0.078s 2020-12-05 13:24:08.627 40 DEBUG tempest.lib.common.rest_client [req-1953aad4-793f-4506-be5a-97cc0cf36d7b ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-1953aad4-793f-4506-be5a-97cc0cf36d7b', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/projects/6161f111bac042e787eb9466e49897d7/users/455e40f31ebb4fafa67c27ba4e8977a7/roles/72a4576c553448cd941b052c1ca0cf2d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.627 40 INFO tempest.lib.common.dynamic_creds [-] Acquired dynamic creds: credentials: Credentials: {'domain_id': 'default', 'domain_name': 'Default', 'username': 'tempest-ServerActionsV214RbacTest-1416270533', 'project_domain_id': 'default', 'project_domain_name': 'Default', 'project_id': '6161f111bac042e787eb9466e49897d7', 'project_name': 'tempest-ServerActionsV214RbacTest-1416270533', 'tenant_id': '6161f111bac042e787eb9466e49897d7', 'tenant_name': 'tempest-ServerActionsV214RbacTest-1416270533', 'user_domain_id': 'default', 'user_domain_name': 'Default', 'user_id': '455e40f31ebb4fafa67c27ba4e8977a7'}, Network: None, Subnet: None, Router: None 2020-12-05 13:24:08.667 38 INFO tempest.lib.common.rest_client [req-eb78ec70-7735-4bb2-b1fe-5f80f2785125 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94/identity/v3/users/5f8a6514f9e148fb8f2869e7da84347d 0.196s 2020-12-05 13:24:08.668 38 DEBUG tempest.lib.common.rest_client [req-eb78ec70-7735-4bb2-b1fe-5f80f2785125 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-eb78ec70-7735-4bb2-b1fe-5f80f2785125', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94/identity/v3/users/5f8a6514f9e148fb8f2869e7da84347d'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.719 40 INFO tempest.lib.common.rest_client [req-ff6d3357-1a7f-4658-bcfc-dc7705c8f429 ] Request (ServerActionsV214RbacTest:setUpClass): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.090s 2020-12-05 13:24:08.720 40 DEBUG tempest.lib.common.rest_client [req-ff6d3357-1a7f-4658-bcfc-dc7705c8f429 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6669', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-ff6d3357-1a7f-4658-bcfc-dc7705c8f429', 'connection': 'close', 'status': '201', 'content-location': 'http://172.30.13.94/identity/v3/auth/tokens'} Body: b'{"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "4c0f40aa9e324a91ada6723358bcbe06", "name": "patrole_member-user_d465c2ad-4b65-4ce6-8c54-94723b36e88d", "password_expires_at": null}, "audit_ids": ["bWeVXLKuT5K0Tq56aUiO8A"], "expires_at": "2020-12-05T14:24:08.000000Z", "issued_at": "2020-12-05T13:24:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3e871bfd802640ef88e271e4434bcba7", "name": "patrole_member-project_d465c2ad-4b65-4ce6-8c54-94723b36e88d"}, "is_domain": false, "roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin"}, {"id": "72a4576c553448cd941b052c1ca0cf2d", "name": "member"}, {"id": "1e19bcd7bbf942efbf11ab49e65f6b38", "name": "reader"}], "catalog": [{"endpoints": [{"id": "a487ee03e92a4217a0c811f668a2a36a", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api/v1/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "2dd99a84fcfe4d4c902af3c7e3370547", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "e9dd205187ea41a892866b024049fce6", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/volume/v3/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "4f0aec6b5f2347eeaf7987d5e52c15ee", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "95f8d7dfabd2409f80171a7da2b97801", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/heat-api-cfn/v1", "region": "RegionOne"}], "id": "5635f75247b445dd8c099f6dae4391e9", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "3353d0a92ded41a09b6c05639659e674", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:9696/", "region": "RegionOne"}], "id": "5b112e1f9f554e9ea13076091373ba24", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "9052c2aa69ad4515b0d5317728427d07", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/placement", "region": "RegionOne"}], "id": "7e47b727207a4e4e806b20fab1e17997", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "6cb58f59cde44905b6977340e58946a7", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/compute/v2/3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "8f2830f7e6d24fe0b8bf0b4df9612609", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "2d637aab47404e86a337d7709d4b9e76", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "50ae4e8e886c4e78936a83e431b3ccaa", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}, {"id": "656491cd5b4d40bca3d3efcd4f0f52ea", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8080/swift/v1/AUTH_3e871bfd802640ef88e271e4434bcba7", "region": "RegionOne"}], "id": "943b628f9f61458d9ef457915c0a4842", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "071af8a832b14546802f7357c8baf784", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}, {"id": "c79d0afaf43b4b8da31c830eaaac449d", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94/identity", "region": "RegionOne"}], "id": "a2db5aab3c1d485cbf6ccd92ea7a2995", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "80b27fd075a04c13b69c9f1db92c29cb", "interface": "admin", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "d8e96e3c019d4f799a5eaee9a0ae4aab", "interface": "public", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}, {"id": "f4b7d873515c46dda9ba58e231fad4a8", "interface": "internal", "region_id": "RegionOne", "url": "http://172.30.13.94:8042", "region": "RegionOne"}], "id": "a372e5d5aaed47178d6bd28e25c4ed16", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "1f9c _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.828 38 INFO tempest.lib.common.rest_client [req-f37a2696-11b7-4500-8c5e-590cb0e36d2d ] Request (QuotaSetsRbacTest:tearDownClass): 200 GET http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1072a955035749bcb4553040c2a94524&name=default 0.159s 2020-12-05 13:24:08.828 38 DEBUG tempest.lib.common.rest_client [req-f37a2696-11b7-4500-8c5e-590cb0e36d2d ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'content-type': 'application/json', 'content-length': '2452', 'x-openstack-request-id': 'req-f37a2696-11b7-4500-8c5e-590cb0e36d2d', 'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups?tenant_id=1072a955035749bcb4553040c2a94524&name=default'} Body: b'{"security_groups": [{"id": "93125275-b8df-4357-920a-6fb8c5819667", "name": "default", "stateful": true, "tenant_id": "1072a955035749bcb4553040c2a94524", "description": "Default security group", "security_group_rules": [{"id": "1289e6ec-1ce1-4e63-a61c-d52f699b222f", "tenant_id": "1072a955035749bcb4553040c2a94524", "security_group_id": "93125275-b8df-4357-920a-6fb8c5819667", "ethertype": "IPv6", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1072a955035749bcb4553040c2a94524"}, {"id": "58c3f343-4d7a-4256-9e10-0830664281fd", "tenant_id": "1072a955035749bcb4553040c2a94524", "security_group_id": "93125275-b8df-4357-920a-6fb8c5819667", "ethertype": "IPv4", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "93125275-b8df-4357-920a-6fb8c5819667", "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1072a955035749bcb4553040c2a94524"}, {"id": "7b0b2e5f-56a2-46a1-a4ef-3873e7333dfc", "tenant_id": "1072a955035749bcb4553040c2a94524", "security_group_id": "93125275-b8df-4357-920a-6fb8c5819667", "ethertype": "IPv6", "direction": "ingress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": "93125275-b8df-4357-920a-6fb8c5819667", "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1072a955035749bcb4553040c2a94524"}, {"id": "f10001b3-f913-482d-812a-030ad4ea7153", "tenant_id": "1072a955035749bcb4553040c2a94524", "security_group_id": "93125275-b8df-4357-920a-6fb8c5819667", "ethertype": "IPv4", "direction": "egress", "protocol": null, "port_range_min": null, "port_range_max": null, "remote_ip_prefix": null, "remote_group_id": null, "description": null, "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 0, "project_id": "1072a955035749bcb4553040c2a94524"}], "tags": [], "created_at": "2020-12-05T13:24:08Z", "updated_at": "2020-12-05T13:24:08Z", "revision_number": 1, "project_id": "1072a955035749bcb4553040c2a94524"}]}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.937 39 INFO tempest.lib.common.rest_client [req-0e3a4cf2-7949-4c2f-aae8-71e9ab0b5b23 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 POST http://172.30.13.94/compute/v2.1/os-security-groups 0.590s 2020-12-05 13:24:08.938 39 DEBUG tempest.lib.common.rest_client [req-0e3a4cf2-7949-4c2f-aae8-71e9ab0b5b23 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: {"security_group": {"name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1707102920", "description": "tempest-description-1456002768"}} Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-length': '251', 'content-type': 'application/json', 'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 'req-0e3a4cf2-7949-4c2f-aae8-71e9ab0b5b23', 'x-compute-request-id': 'req-0e3a4cf2-7949-4c2f-aae8-71e9ab0b5b23', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/compute/v2.1/os-security-groups'} Body: b'{"security_group": {"id": "dda887fa-170b-44be-9f27-6dcb1e979941", "description": "tempest-description-1456002768", "name": "tempest-SecurityGroupsRbacMaxV235Test-securitygroup-1707102920", "tenant_id": "45083965a56643f4aaff2a805ccfa2a8", "rules": []}}' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:08.945 39 DEBUG patrole_tempest_plugin.rbac_utils [-] Overriding role to: True. _override_role /usr/lib/python3.8/site-packages/patrole_tempest_plugin/rbac_utils.py:306 2020-12-05 13:24:08.999 38 INFO tempest.lib.common.rest_client [req-1bb2ed07-bf46-40f5-957c-c81b7a06c0e7 ] Request (QuotaSetsRbacTest:tearDownClass): 204 DELETE http://172.30.13.94:9696/v2.0/security-groups/93125275-b8df-4357-920a-6fb8c5819667 0.169s 2020-12-05 13:24:08.999 38 DEBUG tempest.lib.common.rest_client [req-1bb2ed07-bf46-40f5-957c-c81b7a06c0e7 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'x-openstack-request-id': 'req-1bb2ed07-bf46-40f5-957c-c81b7a06c0e7', 'content-length': '0', 'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'connection': 'close', 'status': '204', 'content-location': 'http://172.30.13.94:9696/v2.0/security-groups/93125275-b8df-4357-920a-6fb8c5819667'} Body: b'' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:09.008 39 INFO tempest.lib.common.rest_client [req-639b09a6-cee8-458f-899f-ce3519403363 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 200 GET http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles 0.062s 2020-12-05 13:24:09.009 39 DEBUG tempest.lib.common.rest_client [req-639b09a6-cee8-458f-899f-ce3519403363 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 'X-Auth-Token': ''} Body: None Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:08 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '411', 'vary': 'X-Auth-Token', 'x-openstack-request-id': 'req-639b09a6-cee8-458f-899f-ce3519403363', 'connection': 'close', 'status': '200', 'content-location': 'http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles'} Body: b'{"roles": [{"id": "a629c95d64b3416fb80ae90af4f69c05", "name": "admin", "domain_id": null, "description": null, "options": {"immutable": true}, "links": {"self": "http://172.30.13.94/identity/v3/roles/a629c95d64b3416fb80ae90af4f69c05"}}], "links": {"next": null, "self": "http://172.30.13.94/identity/v3/projects/45083965a56643f4aaff2a805ccfa2a8/users/78f1f1290e904912b1d8d30fc63b22d2/roles", "previous": null}}\n' _log_request_full /root/.rally/verification/verifier-b49052d2-b231-419e-a4f5-249b756eab65/repo/tempest/lib/common/rest_client.py:449 2020-12-05 13:24:09.103 39 INFO tempest.lib.common.rest_client [req-a17a2bcd-5886-4b67-ae04-e31da805c0c5 ] Request (SecurityGroupsRbacMaxV235Test:test_delete_security_groups): 201 POST http://172.30.13.94/identity/v3/auth/tokens 0.093s 2020-12-05 13:24:09.104 39 DEBUG tempest.lib.common.rest_client [req-a17a2bcd-5886-4b67-ae04-e31da805c0c5 ] Request - Headers: {'Content-Type': 'application/json', 'Accept': 'application/json'} Body: Response - Headers: {'date': 'Sat, 05 Dec 2020 13:24:09 GMT', 'server': 'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 'content-length': '6646', 'x-subject-token': '', 'vary': 'X-Auth-Token', 'x-openstack-req